My Account Log in

1 option

Public-Key Cryptography - PKC 2018 : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II / edited by Michel Abdalla, Ricardo Dahab.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Abdalla, Michel, Editor.
Dahab, Ricardo, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10770
Security and Cryptology ; 10770
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Software engineering.
Computer engineering.
Computer networks.
Computers.
Cryptology.
Software Engineering.
Computer Engineering and Networks.
Computing Milieux.
Local Subjects:
Cryptology.
Software Engineering.
Computer Engineering and Networks.
Computing Milieux.
Physical Description:
1 online resource (XIX, 760 pages) : 95 illustrations
Edition:
1st ed. 2018.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.
Contents:
Key-Dependent-Message and Selective-Opening Security
Searchable and Fully Homomorphic Encryption
Public-Key Encryption
Encryption with Bad Randomness
Subversion Resistance
Cryptanalysis
Composable Security
Oblivious Transfer
Multiparty Computation
Signatures
Structure-Preserving Signatures
Functional Encryption
Foundations
Obfuscation-Based Cryptographic Constructions
Protocols
Blockchain
Zero-Knowledge
Lattices.
Other Format:
Printed edition:
ISBN:
978-3-319-76581-5
9783319765815
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account