1 option
Advances in Cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III / edited by Jesper Buus Nielsen, Vincent Rijmen.
SpringerLink Books Computer Science (2011-2024) Available online
SpringerLink Books Computer Science (2011-2024)- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10822
- Security and Cryptology ; 10822
- Language:
- English
- Subjects (All):
- Cryptography.
- Data encryption (Computer science).
- Software engineering.
- Coding theory.
- Information theory.
- Computers and civilization.
- Data mining.
- Artificial intelligence.
- Cryptology.
- Software Engineering.
- Coding and Information Theory.
- Computers and Society.
- Data Mining and Knowledge Discovery.
- Artificial Intelligence.
- Local Subjects:
- Cryptology.
- Software Engineering.
- Coding and Information Theory.
- Computers and Society.
- Data Mining and Knowledge Discovery.
- Artificial Intelligence.
- Physical Description:
- 1 online resource (XIX, 719 pages)
- Edition:
- 1st ed. 2018.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- System Details:
- text file PDF
- Summary:
- The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-78372-7
- 9783319783727
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.