Advances in Cryptology - EUROCRYPT 2015
Editat de Elisabeth Oswald, Marc Fischlinen Limba Engleză Paperback – 31 mar 2015
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 348.53 lei 6-8 săpt. | |
| Springer – apr 2015 | 348.53 lei 6-8 săpt. | |
| Springer – 31 mar 2015 | 650.32 lei 6-8 săpt. |
Preț: 650.32 lei
Preț vechi: 812.90 lei
-20%
Puncte Express: 975
Preț estimativ în valută:
114.97€ • 133.76$ • 100.01£
114.97€ • 133.76$ • 100.01£
Carte tipărită la comandă
Livrare economică 17 aprilie-01 mai
Specificații
ISBN-13: 9783662468029
ISBN-10: 3662468026
Pagini: 856
Ilustrații: XVIII, 838 p. 102 illus.
Dimensiuni: 155 x 235 x 46 mm
Greutate: 1.27 kg
Ediția:2015
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662468026
Pagini: 856
Ilustrații: XVIII, 838 p. 102 illus.
Dimensiuni: 155 x 235 x 46 mm
Greutate: 1.27 kg
Ediția:2015
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Universal Signature Aggregators.- Fully Structure-Preserving Signatures and Shrinking Commitments.- Disjunctions for Hash Proof Systems: New Constructions and Applications.- Quasi-Adaptive NIZK for Linear Subspaces Revisited.- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware.- Noisy Leakage .- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge.- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates.- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.- The Bitcoin Backbone Protocol: Analysis and Applications.- Linear Secret Sharing Schemes from Error Correcting Codes.- Function Secret Sharing.- Cluster Computing in Zero Knowledge.- Hosting Services on an Untrusted Cloud.- How to Obfuscate Programs Directly.- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings.- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model.- Cryptographic Reverse Firewalls.- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols.- Authenticated Key Exchange from Ideal Lattices.- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model.- Privacy Amplification in the Isolated Qubits Model.- Generic Hardness of the Multiple Discrete Logarithm Problem.