Cantitate/Preț
Produs

Advances in Cryptology - CRYPTO 2018: Lecture Notes in Computer Science, cartea 10993

Editat de Hovav Shacham, Alexandra Boldyreva
en Limba Engleză Paperback – 24 iul 2018
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 64968 lei  43-57 zile
  Springer – 24 iul 2018 64968 lei  43-57 zile
  Springer – 25 iul 2018 65193 lei  43-57 zile
  Springer – 25 iul 2018 65214 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 64968 lei

Preț vechi: 81211 lei
-20%

Puncte Express: 975

Preț estimativ în valută:
11488 13174$ 9929£

Carte tipărită la comandă

Livrare economică 27 aprilie-11 mai


Specificații

ISBN-13: 9783319968773
ISBN-10: 3319968777
Pagini: 804
Ilustrații: XV, 787 p. 93 illus.
Dimensiuni: 155 x 235 x 43 mm
Greutate: 1.19 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Secure messaging.- Implementations and physical attacks prevention.- Authenticated and format-preserving encryption.- Cryptoanalysis.- Searchable encryption and differential privacy.- Secret sharing.- Encryption.- Symmetric cryptography.- Proofs of work and proofs of Stake.- Proof tools.- Key exchange.- Symmetric cryptoanalysis.- Hashes and random oracles.- Trapdoor functions.- Round optimal MPC.- Foundations.- Lattices.- Lattice-based ZK.- Efficient MPC.- Quantum cryptography.- MPC.- Garbling.- Information-theoretic MPC.- Oblivious transfer.- Non-malleable codes.- Zero knowledge.- Obfuscation.