|
Showing 1 - 6 of
6 matches in All Departments
The two-volume proceedings set LNCS 13940 and 13941 constitutes the
refereed proceedings of the 26th IACR International Conference on
Practice and Theory of Public Key Cryptography, PKC 2023, which
took place in March 2023 in Atlanta, GA, USA.The 49 papers included
in these proceedings were carefully reviewed and selected from 183
submissions. They focus on all aspects of public-key cryptography,
covering Post-Quantum Cryptography, Key Exchange and Messaging,
Encryption, Homomorphic Cryptography and other topics.
The two-volume proceedings set LNCS 13940 and 13941 constitutes the
refereed proceedings of the 26th IACR International Conference on
Practice and Theory of Public Key Cryptography, PKC 2023, which
took place in March 2023 in Atlanta, GA, USA.The 49 papers included
in these proceedings were carefully reviewed and selected from 183
submissions. They focus on all aspects of public-key cryptography,
covering Post-Quantum Cryptography, Key Exchange and Messaging,
Encryption, Homomorphic Cryptography and other topics.
This book constitutes the proceedings of the 12th International
Conference on Security and Cryptography for Networks, SCN 2020,
held in Amalfi, Italy, in September 2020*.The 33 papers presented
in this volume were carefully reviewed and selected from 87
submissions. They are organized in topical sections on blockchain;
multiparty computation; oblivious RAM; primitives and
constructions; signatures, encryption, and algebraic constructions;
symmetric crypto; theory and lower bounds ; zero-knowledge. *The
conference was held virtually due to the COVID-19 pandemic.
|
Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings (Paperback, 1st ed. 2020)
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Fourth
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.The
12 full and 4 short papers presented in this volume were carefully
reviewed and selected from 38 submissions. They deal with the
theory, design, analysis, implementation, or application of cyber
security, cryptography and machine learning systems and networks,
and conceptually innovative topics in these research areas.
|
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
|
R1,690
Discovery Miles 16 900
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 13th
International Conference on Applied Cryptography and Network
Security, ACNS 2015, held in New York, NY, USA, in June 2015. The
33 revised full papers included in this volume and presented
together with 2 abstracts of invited talks, were carefully reviewed
and selected from 157 submissions. They are organized in topical
sections on secure computation: primitives and new models; public
key cryptographic primitives; secure computation II: applications;
anonymity and related applications; cryptanalysis and attacks
(symmetric crypto); privacy and policy enforcement; authentication
via eye tracking and proofs of proximity; malware analysis and side
channel attacks; side channel countermeasures and tamper
resistance/PUFs; and leakage resilience and pseudorandomness.
Since its introduction by Andrew Yao in the 1980s, multi-party
computation has developed from a theoretical curiosity to an
important tool for building large-scale privacy-preserving
applications. Secure multi-party computation (MPC) enables a group
to jointly perform a computation without disclosing any
participant's private inputs. The participants agree on a function
to compute, and then can use an MPC protocol to jointly compute the
output of that function on their secret inputs without revealing
them. This monograph provides an introduction to multi-party
computation for practitioners interested in building
privacy-preserving applications and researchers who want to work in
the area. The authors introduce the foundations of MPC and describe
the current state of the art. The goal is to enable readers to
understand what is possible today, and what may be possible in the
future. It provides a starting point for building applications
using MPC and for developing MPC protocols, implementations, tools,
and applications. Those seeking a concise, accessible introduction
to the topic which quickly enables them to build practical systems
or conduct further research will find this essential reading.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|