Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I: Lecture Notes in Computer Science, cartea 11692
Editat de Alexandra Boldyreva, Daniele Micciancioen Limba Engleză Paperback – aug 2019
The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections:
Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse.
Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations.
Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (3) | 781.59 lei 6-8 săpt. | |
Springer International Publishing – aug 2019 | 781.59 lei 6-8 săpt. | |
Springer International Publishing – aug 2019 | 891.03 lei 6-8 săpt. | |
Springer International Publishing – 3 aug 2019 | 891.20 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 741.34 lei
- 20% Preț: 340.22 lei
- 20% Preț: 343.43 lei
- 20% Preț: 315.18 lei
- 20% Preț: 327.41 lei
- 20% Preț: 1031.06 lei
- 20% Preț: 438.67 lei
- 20% Preț: 315.76 lei
- 20% Preț: 330.61 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 995.03 lei
- 20% Preț: 562.71 lei
- 20% Preț: 237.99 lei
- 20% Preț: 504.57 lei
- 20% Preț: 332.20 lei
- 15% Preț: 563.85 lei
- 20% Preț: 636.26 lei
- 5% Preț: 365.59 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.38 lei
- Preț: 370.38 lei
- 20% Preț: 172.68 lei
- 20% Preț: 315.76 lei
- 20% Preț: 662.78 lei
- 20% Preț: 256.26 lei
- 20% Preț: 440.36 lei
- 20% Preț: 626.79 lei
- 20% Preț: 566.70 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 579.38 lei
- 20% Preț: 301.94 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 330.61 lei
- 20% Preț: 1044.38 lei
- 20% Preț: 574.58 lei
- Preț: 399.17 lei
- 20% Preț: 802.24 lei
- 20% Preț: 569.11 lei
- 20% Preț: 1374.12 lei
- 20% Preț: 333.84 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.97 lei
Preț: 781.59 lei
Preț vechi: 953.16 lei
-18% Nou
Puncte Express: 1172
Preț estimativ în valută:
149.59€ • 157.81$ • 124.66£
149.59€ • 157.81$ • 124.66£
Carte tipărită la comandă
Livrare economică 03-17 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030269470
ISBN-10: 3030269477
Pagini: 2450
Ilustrații: XXIII, 771 p. 1614 illus., 51 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.09 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030269477
Pagini: 2450
Ilustrații: XXIII, 771 p. 1614 illus., 51 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.09 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Award Papers.- Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.- Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE.- Fully Secure Attribute-Based Encryption for t-CNF from LWE.- Lattice-Based ZK.- Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors.- Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.- Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.- Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs.- Symmetric Cryptography.- Seedless Fruit is the Sweetest: Random Number Generation, Revisited.- Nonces are Noticed: AEAD Revisited.- How to Build Pseudorandom Functions From Public Random Permutations.- Mathematical Cryptanalysis.- New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.- On the Shortness of Vectors to be found bythe Ideal-SVP Quantum Algorithm.- Proofs of Storage.- Proofs of Replicated Storage Without Timing Assumptions.- Simple Proofs of Space-Time and Rational Proofs of Storage.- Non-Malleable Codes.- Non-Malleable Codes for Decision Trees.- Explicit Rate-1 Non-malleable Codes for Local Tampering.- Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space.- SNARKs and Blockchains.- Synchronous, with a Chance of Partition Tolerance.- Subvector Commitments with Application to Succinct Arguments.- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.- Homomorphic Cryptography.- On the Plausibility of Fully Homomorphic Encryption for RAMs.- Homomorphic Time-Lock Puzzles and Applications.- Symmetric Primitives with Structured Secrets.- Leakage Models and Key Reuse.- Unifying Leakage Models on a Rényi Day.- Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.- Security inthe Presence of Key Reuse: Context-Separable Interfaces and their Applications.