Cantitate/Preț
Produs

Advances in Cryptology - CRYPTO 2018: Lecture Notes in Computer Science, cartea 10992

Editat de Hovav Shacham, Alexandra Boldyreva
en Limba Engleză Paperback – 25 iul 2018
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 64968 lei  6-8 săpt.
  Springer – 24 iul 2018 64968 lei  6-8 săpt.
  Springer – 25 iul 2018 65193 lei  6-8 săpt.
  Springer – 25 iul 2018 65214 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 65214 lei

Preț vechi: 81517 lei
-20%

Puncte Express: 978

Preț estimativ în valută:
11532 13224$ 9966£

Carte tipărită la comandă

Livrare economică 27 aprilie-11 mai


Specificații

ISBN-13: 9783319968803
ISBN-10: 3319968807
Pagini: 852
Ilustrații: XV, 833 p. 113 illus.
Dimensiuni: 155 x 235 x 46 mm
Greutate: 1.26 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Secure messaging.- Implementations and physical attacks prevention.- Authenticated and format-preserving encryption.- Cryptoanalysis.- Searchable encryption and differential privacy.- Secret sharing.- Encryption.- Symmetric cryptography.- Proofs of work and proofs of Stake.- Proof tools.- Key exchange.- Symmetric cryptoanalysis.- Hashes and random oracles.- Trapdoor functions.- Round optimal MPC.- Foundations.- Lattices.- Lattice-based ZK.- Efficient MPC.- Quantum cryptography.- MPC.- Garbling.- Information-theoretic MPC.- Oblivious transfer.- Non-malleable codes.- Zero knowledge.- Obfuscation.