Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I: Lecture Notes in Computer Science, cartea 12710
Editat de Juan A. Garayen Limba Engleză Paperback – mai 2021
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 804.20 lei 6-8 săpt. | |
Springer International Publishing – mai 2021 | 804.20 lei 6-8 săpt. | |
Springer International Publishing – mai 2021 | 912.64 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 912.64 lei
Preț vechi: 1112.97 lei
-18% Nou
Puncte Express: 1369
Preț estimativ în valută:
174.68€ • 181.67$ • 146.38£
174.68€ • 181.67$ • 146.38£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030752446
ISBN-10: 3030752445
Pagini: 756
Ilustrații: XVII, 756 p. 93 illus., 29 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030752445
Pagini: 756
Ilustrații: XVII, 756 p. 93 illus., 29 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Post-Quantum Constructions and Cryptanalysis.- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model.- An Alternative Approach for SIDH Arithmetic.- The Convergence of Slide-type Reductions.- On the Success Probability of Solving Unique SVP via BKZ.- Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.- Isogeny-based key compression without pairings.- Analysis of Multivariate Encryption Schemes: Application to Dob.- On the Integer Polynomial Learning with Errors Problem.- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.- Multivariate Public Key Cryptosystem from Sidon Spaces.- Banquet: Short and Fast Signatures from AES.- Cryptographic Primitives and Schemes.- Improving Revocation for Group Signature with Redactable Signature.- Bootstrapping fully homomorphic encryption over the integers in less than one second.- Group Signatures with User-Controlled and Sequential Linkability.- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.- Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks.- Two-Party Adaptor Signatures From Identification Schemes.- Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.- Universal Proxy Re-Encryption.- Master-Key KDM-Secure ABE via Predicate Encoding.- Exact Lattice Sampling from Non-Gaussian Distributions.- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.- Subversion-Resilient Public Key Encryption with Practical Watchdogs.- Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.- Updatable Signatures and Message Authentication Codes.- Multi-Client Functional Encryption for Separable Functions.