Public-Key Cryptography – PKC 2018

21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Public-Key Cryptography – PKC 2018 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319765815
Publisher: Springer International Publishing Publication: March 5, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319765815
Publisher: Springer International Publishing
Publication: March 5, 2018
Imprint: Springer
Language: English

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.

The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

More books from Springer International Publishing

Cover of the book Model Validation and Uncertainty Quantification, Volume 3 by
Cover of the book Impacts of Medications on Male Fertility by
Cover of the book Challenges and Opportunities in Health Care Management by
Cover of the book Engineering Secure Software and Systems by
Cover of the book Novel Methods for Monitoring and Managing Land and Water Resources in Siberia by
Cover of the book Nature-Inspired Design of Hybrid Intelligent Systems by
Cover of the book CONTROLO 2016 by
Cover of the book Urban Environment, Travel Behavior, Health, and Resident Satisfaction by
Cover of the book Engineering Legitimacy by
Cover of the book Nonlinear Vibrations and the Wave Equation by
Cover of the book Database and Expert Systems Applications by
Cover of the book Key Topics in Management of the Critically Ill by
Cover of the book IR Playbook by
Cover of the book Evaluation of Novel Approaches to Software Engineering by
Cover of the book Education Skills for 21st Century Teachers by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy