Public-Key Cryptography – PKC 2018

21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Public-Key Cryptography – PKC 2018 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319765785
Publisher: Springer International Publishing Publication: March 5, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319765785
Publisher: Springer International Publishing
Publication: March 5, 2018
Imprint: Springer
Language: English

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

More books from Springer International Publishing

Cover of the book Conquering Big Data with High Performance Computing by
Cover of the book Environmental Law and Economics by
Cover of the book Killing Time by
Cover of the book Animals and the Fukushima Nuclear Disaster by
Cover of the book AETA 2015: Recent Advances in Electrical Engineering and Related Sciences by
Cover of the book Formal Specification Level by
Cover of the book Information Security Practice and Experience by
Cover of the book Proceedings of the Second International Conference on Mechatronics and Automatic Control by
Cover of the book Hong Kong 20 Years after the Handover by
Cover of the book The Property Tax in China by
Cover of the book Phenomenology and Intercultural Understanding by
Cover of the book Scientific Peer Reviewing by
Cover of the book Borders and Mobility in Turkey by
Cover of the book Non-commutative Multiple-Valued Logic Algebras by
Cover of the book Perspectives on HCI Research with Teenagers by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy