1 option
Advances in Cryptology - EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I / edited by Jean-Sébastien Coron, Jesper Buus Nielsen.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10210.
- Security and Cryptology ; 10210
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer security.
- Management information systems.
- Computer science.
- Software engineering.
- Computer science--Mathematics.
- Cryptology.
- Systems and Data Security.
- Management of Computing and Information Systems.
- Software Engineering.
- Discrete Mathematics in Computer Science.
- Local Subjects:
- Cryptology.
- Systems and Data Security.
- Management of Computing and Information Systems.
- Software Engineering.
- Discrete Mathematics in Computer Science.
- Physical Description:
- 1 online resource (XXIII, 709 pages) : 76 illustrations.
- Edition:
- First edition 2017.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2017.
- System Details:
- text file PDF
- Summary:
- The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
- Contents:
- Lattice attacks and constructions
- Obfuscation and functional encryption
- Discrete logarithm
- Multiparty computation
- Universal composability
- Zero knowledge
- Side-channel attacks and countermeasures
- Functional encryption
- Elliptic curves
- Symmetric cryptanalysis
- Provable security for symmetric cryptography
- security models:- Blockchain
- Memory hard functions
- Symmetric-key constructions
- Obfuscation
- Quantum cryptography
- Public-key encryption and key-exchange.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-56620-7
- 9783319566207
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.