Vorliegende Sprache |
eng |
ISBN |
978-3-319-56616-0 |
Name |
Coron, Jean-Sébastien ¬[Hrsg.]¬ |
Nielsen, Jesper Buus ¬[Hrsg.]¬ |
Name ANZEIGE DER KETTE |
Nielsen, Jesper Buus ¬[Hrsg.]¬ |
T I T E L |
Advances in Cryptology – EUROCRYPT 2017 |
Zusatz zum Titel |
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III |
Verlagsort |
Cham |
Verlag |
Springer |
Erscheinungsjahr |
2017 |
2017 |
Umfang |
Online-Ressource (XXI, 641 p. 54 illus, online resource) |
Reihe |
Lecture Notes in Computer Science ; 10212 |
Lecture notes in computer science |
Band |
10212 |
Titelhinweis |
Druckausg.ISBN: 978-3-319-56616-0 |
ISBN |
ISBN 978-3-319-56617-7 |
Klassifikation |
*94-06 |
94A60 |
00B25 |
URY |
COM053000 |
GPJ |
005.82 |
005.824 |
QA76.9.A25 |
Kurzbeschreibung |
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange |
2. Kurzbeschreibung |
Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange |
1. Schlagwortkette |
Kryptologie |
Kryptosystem |
ANZEIGE DER KETTE |
Kryptologie -- Kryptosystem |
SWB-Titel-Idn |
488874688 |
Signatur |
Springer E-Book |
Bemerkungen |
Elektronischer Volltext - Campuslizenz |
Elektronische Adresse |
$uhttp://dx.doi.org/10.1007/978-3-319-56617-7 |
Internetseite / Link |
Volltext |
Siehe auch |
Inhaltstext |