My Account Log in

1 option

Advances in Cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III / edited by Jesper Buus Nielsen, Vincent Rijmen.

SpringerLink Books Computer Science (2011-2024) Available online

SpringerLink Books Computer Science (2011-2024)
Format:
Book
Contributor:
Nielsen, Jesper Buus., Editor.
Rijmen, Vincent., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10822
Security and Cryptology ; 10822
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Software engineering.
Coding theory.
Information theory.
Computers and civilization.
Data mining.
Artificial intelligence.
Cryptology.
Software Engineering.
Coding and Information Theory.
Computers and Society.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Local Subjects:
Cryptology.
Software Engineering.
Coding and Information Theory.
Computers and Society.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Physical Description:
1 online resource (XIX, 719 pages)
Edition:
1st ed. 2018.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .
Other Format:
Printed edition:
ISBN:
978-3-319-78372-7
9783319783727
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account