Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I: Lecture Notes in Computer Science, cartea 12550
Editat de Rafael Pass, Krzysztof Pietrzaken Limba Engleză Paperback – 15 dec 2020
The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.
Due to the Corona pandemic this event was held virtually.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (3) | 412.78 lei 6-8 săpt. | |
Springer International Publishing – 15 dec 2020 | 412.78 lei 6-8 săpt. | |
Springer International Publishing – 13 dec 2020 | 412.95 lei 6-8 săpt. | |
Springer International Publishing – 13 dec 2020 | 659.53 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 412.78 lei
Nou
Puncte Express: 619
Preț estimativ în valută:
78.100€ • 82.26$ • 66.76£
78.100€ • 82.26$ • 66.76£
Carte tipărită la comandă
Livrare economică 11-25 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030643744
ISBN-10: 3030643743
Pagini: 707
Ilustrații: XVI, 707 p. 54 illus., 3 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030643743
Pagini: 707
Ilustrații: XVI, 707 p. 54 illus., 3 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Lossiness and Entropic Hardness for Ring-LWE.- Multi-key Fully-Homomorphic Encryption in the Plain Model.- Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions.- Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and CP-ABE for Circuits (and more) in the Symmetric Key Setting.- Optimal Broadcast Encryption from LWE and Pairings in the Standard Model.- Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark).- Functional Encryption for Quadratic Functions from k-Lin, Revisited.- On Perfect Correctness in (Lockable) Obfuscation.- Can a Public Blockchain Keep a Secret.- Blockchains from Non-Idealized Hash Functions.- Ledger Combiners for Fast Asynchronous Byzantine Agreement with Subquadratic Communication.- Expected Constant Round Byzantine Broadcast under Dishonest Majority.- Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions.- A Lower Bound for One-Round Oblivious RAM.- Lower Bounds for Multi-Server Oblivious RAMs.- On Computational Shortcuts for Information-Theoretic PIR.- Characterizing Deterministic-Prover Zero Knowledge.- NIZK from SNARG.- Weakly Extractable One-Way Functions.- Towards Non-Interactive Witness Hiding.- FHE-Based Bootstrapping of Designated-Prover NIZK.- Perfect Zero Knowledge: New Upperbounds and Relativized Separations.