Advances in Cryptology – CRYPTO 2017

37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – CRYPTO 2017 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319636887
Publisher: Springer International Publishing Publication: August 8, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319636887
Publisher: Springer International Publishing
Publication: August 8, 2017
Imprint: Springer
Language: English

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.

The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.

The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

More books from Springer International Publishing

Cover of the book Engineering the Atom-Photon Interaction by
Cover of the book Computational Intelligence in Digital and Network Designs and Applications by
Cover of the book Political Leaders Beyond Party Politics by
Cover of the book Film and Democracy in Paraguay by
Cover of the book Offshore Processing of CO2-Rich Natural Gas with Supersonic Separator by
Cover of the book When Parents Kill Children by
Cover of the book The Political Economy of Anti-dumping Protection by
Cover of the book Traffic and Granular Flow '13 by
Cover of the book India as an Organization: Volume Two by
Cover of the book Growth of High Permittivity Dielectrics by High Pressure Sputtering from Metallic Targets by
Cover of the book Multiple Classifier Systems by
Cover of the book Pediatric Endocrinology by
Cover of the book Wireless Sensors in Industrial Time-Critical Environments by
Cover of the book Research Advances in the Mathematical Education of Pre-service Elementary Teachers by
Cover of the book Universal Access in Human-Computer Interaction. Methods, Techniques, and Best Practices by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy