1 option
Advances in Cryptology - EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II / edited by Jean-Sébastien Coron, Jesper Buus Nielsen.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10211
- Security and Cryptology ; 10211
- Language:
- English
- Subjects (All):
- Cryptography.
- Data encryption (Computer science).
- Data protection.
- Electronic data processing-Management.
- Software engineering.
- Computer science-Mathematics.
- Discrete mathematics.
- Cryptology.
- Data and Information Security.
- IT Operations.
- Software Engineering.
- Discrete Mathematics in Computer Science.
- Local Subjects:
- Cryptology.
- Data and Information Security.
- IT Operations.
- Software Engineering.
- Discrete Mathematics in Computer Science.
- Physical Description:
- 1 online resource (XXI, 677 pages) : 66 illustrations
- Edition:
- 1st ed. 2017.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2017.
- System Details:
- text file PDF
- Summary:
- The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
- Contents:
- Lattice attacks and constructions
- Obfuscation and functional encryption
- Discrete logarithm
- Multiparty computation
- Universal composability
- Zero knowledge
- Side-channel attacks and countermeasures
- Functional encryption
- Elliptic curves
- Symmetric cryptanalysis
- Provable security for symmetric cryptography
- security models:- Blockchain
- Memory hard functions
- Symmetric-key constructions
- Obfuscation
- Quantum cryptography
- Public-key encryption and key-exchange.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-56614-6
- 9783319566146
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.