My Account Log in

1 option

Advances in Cryptology - EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I / edited by Yuval Ishai, Vincent Rijmen.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Ishai, Yuval, editor.
Rijmen, Vincent, 1970- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11476.
Security and Cryptology ; 11476
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Software engineering.
Computers and civilization.
Data mining.
Artificial intelligence.
Cryptology.
Coding and Information Theory.
Software Engineering/Programming and Operating Systems.
Computers and Society.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Local Subjects:
Cryptology.
Coding and Information Theory.
Software Engineering/Programming and Operating Systems.
Computers and Society.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Physical Description:
1 online resource (XXVII, 753 pages) : 917 illustrations, 37 illustrations in color.
Edition:
First edition 2019.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.
Contents:
ABE and CCA security
Succinct arguments and secure messaging
Obfuscation
Block ciphers
Differential privacy
Bounds for symmetric cryptography
Non-malleability
Blockchain and consensus
Homomorphic primitives
Standards
Searchable encryption and ORAM
Proofs of work and space
Secure computation
Quantum, secure computation and NIZK, Lattice-based cryptography
Foundations
Efficient secure computation
Signatures
Information-theoretic cryptography
Cryptanalysis.
Other Format:
Printed edition:
ISBN:
978-3-030-17653-2
9783030176532
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account