Cantitate/Preț
Produs

Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10677

Editat de Yael Kalai, Leonid Reyzin
en Limba Engleză Paperback – 5 noi 2017
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 41702 lei  6-8 săpt.
  Springer International Publishing – 5 noi 2017 41702 lei  6-8 săpt.
  Springer International Publishing – 5 noi 2017 66655 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 66655 lei

Preț vechi: 78418 lei
-15% Nou

Puncte Express: 1000

Preț estimativ în valută:
12757 13267$ 10675£

Carte tipărită la comandă

Livrare economică 14-28 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319704999
ISBN-10: 3319704990
Pagini: 801
Ilustrații: XVII, 812 p. 80 illus.
Dimensiuni: 155 x 235 x 50 mm
Greutate: 1.14 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Impossibilities and Barriers.- Obfuscation.- Functional Encryption.- Constrained PRFs.- Encryption.- Moderately Hard Functions.- Blockchains.- Multiparty Computation.- Garbled Circuits and Oblivious RAM.- Zero-Knowledge and Non-Malleability.- Leakage and Tampering.- Delegation.- Non-Malleable Codes.- Secret Sharing.- OT Combiners.- Signatures.- Verifiable Random Functions.- Fully Homomorphic Encryption.- Database Privacy.- Assumptions.

Caracteristici

Includes supplementary material: sn.pub/extras