My Account Log in

1 option

Advances in Cryptology - EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II / edited by Jean-Sébastien Coron, Jesper Buus Nielsen.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Coron, Jean-Sébastien, Editor.
Nielsen, Jesper Buus., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10211
Security and Cryptology ; 10211
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing-Management.
Software engineering.
Computer science-Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
IT Operations.
Software Engineering.
Discrete Mathematics in Computer Science.
Local Subjects:
Cryptology.
Data and Information Security.
IT Operations.
Software Engineering.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XXI, 677 pages) : 66 illustrations
Edition:
1st ed. 2017.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2017.
System Details:
text file PDF
Summary:
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
Contents:
Lattice attacks and constructions
Obfuscation and functional encryption
Discrete logarithm
Multiparty computation
Universal composability
Zero knowledge
Side-channel attacks and countermeasures
Functional encryption
Elliptic curves
Symmetric cryptanalysis
Provable security for symmetric cryptography
security models:- Blockchain
Memory hard functions
Symmetric-key constructions
Obfuscation
Quantum cryptography
Public-key encryption and key-exchange.
Other Format:
Printed edition:
ISBN:
978-3-319-56614-6
9783319566146
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account