Cantitate/Preț
Produs

Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10769

Editat de Michel Abdalla, Ricardo Dahab
en Limba Engleză Paperback – mar 2018
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.
The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 41337 lei  6-8 săpt.
  Springer International Publishing – mar 2018 41337 lei  6-8 săpt.
  Springer International Publishing – mar 2018 41605 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 41337 lei

Nou

Puncte Express: 620

Preț estimativ în valută:
7911 8209$ 6612£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319765778
ISBN-10: 3319765779
Pagini: 691
Ilustrații: XIX, 714 p. 164 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.01 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Key-Dependent-Message and Selective-Opening Security.- Searchable and Fully Homomorphic Encryption.- Public-Key Encryption.- Encryption with Bad Randomness.- Subversion Resistance.- Cryptanalysis.- Composable Security.- Oblivious Transfer.- Multiparty Computation.- Signatures.- Structure-Preserving Signatures.- Functional Encryption.- Foundations.- Obfuscation-Based Cryptographic Constructions.- Protocols.- Blockchain.- Zero-Knowledge.- Lattices.