0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Theory of Cryptography - 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings... Theory of Cryptography - 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings (Paperback, 2014 ed.)
Yehuda Lindell
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

Composition of Secure Multi-Party Protocols - A Comprehensive Study (Paperback, 2003 ed.): Yehuda Lindell Composition of Secure Multi-Party Protocols - A Comprehensive Study (Paperback, 2003 ed.)
Yehuda Lindell
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time.

This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.

Introduction to Modern Cryptography (Hardcover, 3rd edition): Jonathan Katz, Yehuda Lindell Introduction to Modern Cryptography (Hardcover, 3rd edition)
Jonathan Katz, Yehuda Lindell
R3,237 Discovery Miles 32 370 Ships in 9 - 15 working days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How to Lead Academic Departments…
Adam Lindgreen, Alan Irwin, … Paperback R1,290 Discovery Miles 12 900
WTF - Capturing Zuma: A Cartoonist's…
Zapiro Paperback R295 R231 Discovery Miles 2 310
Anatomy - A Love Story
Dana Schwartz Paperback R304 R250 Discovery Miles 2 500
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R279 Discovery Miles 2 790
Lottie Brooks’s Essential Guide to Life
Katie Kirby Paperback R215 R165 Discovery Miles 1 650
100 Mandela Moments
Kate Sidley Paperback R250 R200 Discovery Miles 2 000
Moord Op Stellenbosch - Twee Dekades Se…
Julian Jansen Paperback R350 R301 Discovery Miles 3 010
Imogen, Obviously
Becky Albertalli Paperback R265 R212 Discovery Miles 2 120
Chemistry as a Second Language…
Charity Flener Lovitt, Paul Kelter Hardcover R2,751 Discovery Miles 27 510
Palaces Of Stone - Uncovering Ancient…
Mike Main, Thomas Huffman Paperback R280 R219 Discovery Miles 2 190

 

Partners