1 option
Advances in Cryptology - CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I / edited by Hovav Shacham, Alexandra Boldyreva.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10991.
- Security and Cryptology ; 10991
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Coding theory.
- Information theory.
- Mathematical statistics.
- Software engineering.
- Cryptology.
- Coding and Information Theory.
- Probability and Statistics in Computer Science.
- Software Engineering/Programming and Operating Systems.
- Local Subjects:
- Cryptology.
- Coding and Information Theory.
- Probability and Statistics in Computer Science.
- Software Engineering/Programming and Operating Systems.
- Physical Description:
- 1 online resource (XXIII, 823 pages) : 133 illustrations.
- Edition:
- First edition 2018.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- System Details:
- text file PDF
- Summary:
- The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
- Contents:
- Secure messaging
- Implementations and physical attacks prevention
- Authenticated and format-preserving encryption
- Cryptoanalysis
- Searchable encryption and differential privacy
- Secret sharing
- Encryption
- Symmetric cryptography
- Proofs of work and proofs of Stake
- Proof tools
- Key exchange
- Symmetric cryptoanalysis
- Hashes and random oracles
- Trapdoor functions
- Round optimal MPC
- Foundations
- Lattices
- Lattice-based ZK
- Efficient MPC
- Quantum cryptography
- MPC
- Garbling
- Information-theoretic MPC
- Oblivious transfer
- Non-malleable codes
- Zero knowledge
- Obfuscation.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-96884-1
- 9783319968841
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.