Public-Key Cryptography – PKC 2017

20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Public-Key Cryptography – PKC 2017 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662543887
Publisher: Springer Berlin Heidelberg Publication: February 24, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783662543887
Publisher: Springer Berlin Heidelberg
Publication: February 24, 2017
Imprint: Springer
Language: English

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

More books from Springer Berlin Heidelberg

Cover of the book Tailored Light 1 by
Cover of the book Training emotionaler Kompetenzen by
Cover of the book Ergotherapeutische Behandlungsansätze bei Demenz und dem Korsakow-Syndrom by
Cover of the book Social Business by
Cover of the book Asymptotics for Associated Random Variables by
Cover of the book Radiation, Ionization, and Detection in Nuclear Medicine by
Cover of the book Inborn Metabolic Diseases by
Cover of the book Gelassen und sicher im Stress by
Cover of the book Geothermal Energy by
Cover of the book Verhaltensmedizin by
Cover of the book Challenges in Molecular Structure Determination by
Cover of the book Morphometrics for Nonmorphometricians by
Cover of the book Neurorehabilitation bei Erkrankungen des zentralen Nervensystems by
Cover of the book Notch Regulation of the Immune System by
Cover of the book Repetitive Transcranial Magnetic Stimulation Treatment for Depressive Disorders by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy