Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Cryptology -- CRYPTO 2015

35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
Buch | Softcover
XVIII, 787 Seiten
2015 | 1st ed. 2015
Springer Berlin (Verlag)
978-3-662-47988-9 (ISBN)

Lese- und Medienproben

Advances in Cryptology -- CRYPTO 2015 -
CHF 74,85 inkl. MwSt
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015.The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Lattice-based cryptography.- Cryptanalytic insights.- Modes and constructions.- Multilinear maps and IO.- Pseudorandomness.- Block cipher cryptanalysis.- Integrity.- Assumptions.- Hash functions and stream cipher cryptanalysis.- Implementations.- Multiparty computation.- Zero-knowledge.- Theory.- Signatures.- Non-signaling and information-theoretic crypto.- Attribute-based encryption.- New primitives.- Fully homomorphic/functional encryption.

Erscheint lt. Verlag 11.8.2015
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XVIII, 787 p. 108 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 1203 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte adaptive security • Algorithm analysis and problem complexity • Applications • asymmetric cryptography • biometric authentication • Cascade encryption • Computer Science • conference proceedings • deterministic encryption • formal methods • functional encryption • Informatics • Information Theory • Multi-Party Computation • privacy • Public Key Cryptography • Research • secure computation • Stream Ciphers • symmetric cryptography • Zero Knowledge
ISBN-10 3-662-47988-5 / 3662479885
ISBN-13 978-3-662-47988-9 / 9783662479889
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich