My Account Log in

1 option

Advances in Cryptology - EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II / edited by Elisabeth Oswald, Marc Fischlin.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Oswald, Elisabeth, editor.
Fischlin, Marc, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 9057.
Security and Cryptology ; 9057
Language:
English
Subjects (All):
Data encryption (Computer science).
Algorithms.
Computer security.
Management information systems.
Computer science.
Cryptology.
Algorithm Analysis and Problem Complexity.
Systems and Data Security.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Algorithm Analysis and Problem Complexity.
Systems and Data Security.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XVIII, 838 pages) : 102 illustrations.
Edition:
First edition 2015.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.
Contents:
Universal Signature Aggregators
Fully Structure-Preserving Signatures and Shrinking Commitments
Disjunctions for Hash Proof Systems: New Constructions and Applications
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware
Noisy Leakage
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates
One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
The Bitcoin Backbone Protocol: Analysis and Applications
Linear Secret Sharing Schemes from Error Correcting Codes
Function Secret Sharing
Cluster Computing in Zero Knowledge
Hosting Services on an Untrusted Cloud
How to Obfuscate Programs Directly
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
Cryptographic Reverse Firewalls
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
Authenticated Key Exchange from Ideal Lattices
Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
Privacy Amplification in the Isolated Qubits Model
Generic Hardness of the Multiple Discrete Logarithm Problem.
Other Format:
Printed edition:
ISBN:
978-3-662-46803-6
9783662468036
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account