My Account Log in

1 option

Public-Key Cryptography - PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I / edited by Serge Fehr.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Fehr, S. (Serge), editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10174.
Security and Cryptology ; 10174
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Coding theory.
Information theory.
Computer networks.
Algorithms.
Management information systems.
Computer science.
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XIV, 466 pages) : 32 illustrations.
Edition:
First edition 2017.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2017.
System Details:
text file PDF
Summary:
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
Contents:
Cryptanalysis, Protocols
Encrpytion Schemes
Leakage-Resilient and Non-Malleable Codes
Number Theory and Die-Hellman
Encryption with Access Control
Special Signatures
Fully Homomorphic Encryption
Real-World Schemes
Multiparty Computation
Primitives.
Other Format:
Printed edition:
ISBN:
978-3-662-54365-8
9783662543658
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account