Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV: Lecture Notes in Computer Science, cartea 12828
Editat de Tal Malkin, Chris Peikerten Limba Engleză Paperback – 8 aug 2021
Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments.
Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis.
Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing.
Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (4) | 718.92 lei 6-8 săpt. | |
Springer International Publishing – 8 aug 2021 | 718.92 lei 6-8 săpt. | |
Springer International Publishing – 8 aug 2021 | 722.49 lei 6-8 săpt. | |
Springer International Publishing – 8 aug 2021 | 751.80 lei 6-8 săpt. | |
Springer International Publishing – 10 aug 2021 | 752.25 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 579.30 lei
- Preț: 410.88 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- 15% Preț: 448.04 lei
- 20% Preț: 353.50 lei
- Preț: 389.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 645.28 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 20% Preț: 310.28 lei
- 20% Preț: 655.02 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- Preț: 449.57 lei
- 20% Preț: 591.51 lei
- 18% Preț: 938.83 lei
- 20% Preț: 337.00 lei
- 20% Preț: 649.50 lei
- 20% Preț: 607.40 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 583.40 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.49 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 17% Preț: 360.20 lei
- 20% Preț: 763.23 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.58 lei
- 20% Preț: 369.13 lei
- 20% Preț: 580.93 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- 15% Preț: 438.59 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.30 lei
Preț: 718.92 lei
Preț vechi: 845.80 lei
-15% Nou
Puncte Express: 1078
Preț estimativ în valută:
137.58€ • 143.11$ • 113.58£
137.58€ • 143.11$ • 113.58£
Carte tipărită la comandă
Livrare economică 14-28 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030842581
ISBN-10: 3030842584
Pagini: 732
Ilustrații: XV, 732 p. 112 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.03 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030842584
Pagini: 732
Ilustrații: XV, 732 p. 112 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.03 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Zero Knowledge.- Witness Authenticating NIZKs and Applications.- Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.- Compressing Proofs of k-Out-Of-n Partial Knowledge.- Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions.- Time- and Space-Efficient Arguments from Groups of Unknown Order.- Encryption++.- Broadcast Encryption with Size N1/3 and More from k-Lin.- Fine-grained Secure Attribute-based Encryption.- Multi-Input Quadratic Functional Encryption from Pairings.- Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.- Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.- Foundations.- White Box Traitor Tracing.- Does Fiat-Shamir Require a Cryptographic Hash Function?.- Composition with Knowledge Assumptions.- Non-Interactive Batch Arguments for NP from Standard Assumptions.- Targeted Lossy Functions and Applications.- The t-wise Independence of Substitution-Permutation Networks.- Low-Complexity Cryptography.- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.- No Time to Hash: On Super-Efficient Entropy Accumulation.- Protocols.- A Logarithmic Lower Bound for Oblivious RAM (for all parameters).- Oblivious RAM with Worst-Case Logarithmic Overhead.- Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time.- Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.- KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.