Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Cryptology -- CRYPTO 2015

35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II
Buch | Softcover
XVIII, 783 Seiten
2015 | 1st ed. 2015
Springer Berlin (Verlag)
978-3-662-47999-5 (ISBN)

Lese- und Medienproben

Advances in Cryptology -- CRYPTO 2015 -
CHF 74,85 inkl. MwSt
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015.The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Lattice-based cryptography.- Cryptanalytic insights.- Modes and constructions.- Multilinear maps and IO.- Pseudorandomness.- Block cipher cryptanalysis.- Integrity.- Assumptions.- Hash functions and stream cipher cryptanalysis.- Implementations.- Multiparty computation.- Zero-knowledge.- Theory.- Signatures.- Non-signaling and information-theoretic crypto.- Attribute-based encryption.- New primitives.- Fully homomorphic/functional encryption.

Erscheint lt. Verlag 11.8.2015
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XVIII, 783 p. 76 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte adaptive security • Applications • asymmetric cryptography • biometric authentication • Cascade encryption • Computer Science • conference proceedings • Cryptanalysis • cryptography • deterministic encryption • formal methods • functional encryption • Hash Functions • Informatics • Information Theory • mathematical foundations of cryptography • Multi-Party Computation • privacy • Public Key Cryptography • Research • secure computation • Stream Ciphers • symmetric cryptography • Theory of security • Zero Knowledge
ISBN-10 3-662-47999-0 / 3662479990
ISBN-13 978-3-662-47999-5 / 9783662479995
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich