1 option
Advances in Cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part III / edited by Anne Canteaut, Yuval Ishai.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 12107
- Security and Cryptology ; 12107
- Language:
- English
- Subjects (All):
- Cryptography.
- Data encryption (Computer science).
- Database management.
- Computer networks.
- Data protection.
- Artificial intelligence.
- Cryptology.
- Database Management System.
- Computer Communication Networks.
- Security Services.
- Artificial Intelligence.
- Local Subjects:
- Cryptology.
- Database Management System.
- Computer Communication Networks.
- Security Services.
- Artificial Intelligence.
- Physical Description:
- 1 online resource (XV, 821 pages) : 584 illustrations, 33 illustrations in color.
- Edition:
- 1st ed. 2020.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2020.
- System Details:
- text file PDF
- Summary:
- The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
- Contents:
- Asymmetric Cryptanalysis
- Verifiable Delay Functions
- Signatures
- Attribute-Based Encryption
- Side-Channel Security
- Non-Interactive Zero-Knowledge
- Public-Key Encryption
- Zero-Knowledge
- Quantum II.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-45727-3
- 9783030457273
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.