Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II: Lecture Notes in Computer Science, cartea 11922

Editat de Steven D. Galbraith, Shiho Moriai
en Limba Engleză Paperback – 10 noi 2019
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.
The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 41066 lei  6-8 săpt.
  Springer International Publishing – 10 noi 2019 41066 lei  6-8 săpt.
  Springer International Publishing – 10 noi 2019 41295 lei  6-8 săpt.
  Springer International Publishing – 12 noi 2019 41583 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 41066 lei

Nou

Puncte Express: 616

Preț estimativ în valută:
7859 8175$ 6488£

Carte tipărită la comandă

Livrare economică 15-29 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030346201
ISBN-10: 303034620X
Pagini: 669
Ilustrații: XV, 669 p. 249 illus., 28 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.95 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Lattices.- Symmetric Cryptography.- Isogenies.- Obfuscation.- Multiparty Computation.- Quantum.- E-cash and Blockchain.- Codes.- Authenticated Encryption.- Multilinear Maps.- Homomorphic Encryption.- Combinatorial Cryptography.- Signatures.- Public Key Encryption.- Side Channels.- Functional Encryption.- Zero Knowledge.