Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Cryptology – CRYPTO 2016

36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
Buch | Softcover
XIII, 703 Seiten
2016 | 1st ed. 2016
Springer Berlin (Verlag)
978-3-662-53007-8 (ISBN)

Lese- und Medienproben

Advances in Cryptology – CRYPTO 2016 -
CHF 74,85 inkl. MwSt

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.

The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Provable security for symmetric cryptography.- Asymmetric cryptography and cryptanalysis.- Cryptography in theory and practice.- Compromised systems.- Symmetric cryptanalysis.- Algorithmic number theory.- Symmetric primitives.- Asymmetric cryptography.- Symmetric cryptography.- Cryptanalytic tools.- Hardware-oriented cryptography.- Secure computation and protocols.- Obfuscation.- Quantum techniques.- Spooky encryption.- IBE, ABE, and functional encryption.- Automated tools and synthesis.- Zero knowledge.- Theory.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIII, 703 p. 94 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • authenticated encryption • Computer Science • conference proceedings • cryptanalysis and other attacks • cryptography • data encryption • deployment security • formal methods • Hash Functions • homomorphic encryption • implementation security • Informatics • Integer Programming • Lightweight cryptography • mathematical foundations of cryptography • needles in haystacks • post-quantum cryptography • privacy-preserving protocols • public key techniques • Research • secure computation • supersingular elliptic curves • symmetric cryptography • Theory of security • Zero-knowledge
ISBN-10 3-662-53007-4 / 3662530074
ISBN-13 978-3-662-53007-8 / 9783662530078
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich