1 option
Advances in Cryptology - EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I / edited by Yuval Ishai, Vincent Rijmen.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 11476.
- Security and Cryptology ; 11476
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Coding theory.
- Information theory.
- Software engineering.
- Computers and civilization.
- Data mining.
- Artificial intelligence.
- Cryptology.
- Coding and Information Theory.
- Software Engineering/Programming and Operating Systems.
- Computers and Society.
- Data Mining and Knowledge Discovery.
- Artificial Intelligence.
- Local Subjects:
- Cryptology.
- Coding and Information Theory.
- Software Engineering/Programming and Operating Systems.
- Computers and Society.
- Data Mining and Knowledge Discovery.
- Artificial Intelligence.
- Physical Description:
- 1 online resource (XXVII, 753 pages) : 917 illustrations, 37 illustrations in color.
- Edition:
- First edition 2019.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2019.
- System Details:
- text file PDF
- Summary:
- The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.
- Contents:
- ABE and CCA security
- Succinct arguments and secure messaging
- Obfuscation
- Block ciphers
- Differential privacy
- Bounds for symmetric cryptography
- Non-malleability
- Blockchain and consensus
- Homomorphic primitives
- Standards
- Searchable encryption and ORAM
- Proofs of work and space
- Secure computation
- Quantum, secure computation and NIZK, Lattice-based cryptography
- Foundations
- Efficient secure computation
- Signatures
- Information-theoretic cryptography
- Cryptanalysis.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-17653-2
- 9783030176532
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.