Public-Key Cryptography – PKC 2018

21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Public-Key Cryptography – PKC 2018 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319765815
Publisher: Springer International Publishing Publication: March 5, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319765815
Publisher: Springer International Publishing
Publication: March 5, 2018
Imprint: Springer
Language: English

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

More books from Springer International Publishing

Cover of the book Automotive Electronics Design Fundamentals by
Cover of the book Nanostructured Lead, Cadmium, and Silver Sulfides by
Cover of the book Advances in Conceptual Modeling by
Cover of the book Engineering in Dependability of Computer Systems and Networks by
Cover of the book Dynamic Products by
Cover of the book Citizens' Activism and Solidarity Movements by
Cover of the book Signal Interference in WiFi and ZigBee Networks by
Cover of the book Quantitative Psychology Research by
Cover of the book Evidence-Based Implant Dentistry by
Cover of the book MRI of the Knee by
Cover of the book New Technologies to Improve Patient Rehabilitation by
Cover of the book Supercomputing for Molecular Dynamics Simulations by
Cover of the book Statistical Analysis for High-Dimensional Data by
Cover of the book Binomial Ideals by
Cover of the book Computer Vision - ACCV 2014 Workshops by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy