Public-Key Cryptography - PKC 2016
Editat de Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yangen Limba Engleză Paperback – 23 feb 2016
The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.
Preț: 327.54 lei
Preț vechi: 409.42 lei
-20%
Puncte Express: 491
Preț estimativ în valută:
57.91€ • 68.34$ • 50.72£
57.91€ • 68.34$ • 50.72£
Carte tipărită la comandă
Livrare economică 13-27 aprilie
Specificații
ISBN-13: 9783662493830
ISBN-10: 3662493837
Pagini: 488
Ilustrații: XIV, 472 p. 46 illus. in color.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:1st edition 2016
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662493837
Pagini: 488
Ilustrații: XIV, 472 p. 46 illus. in color.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:1st edition 2016
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Cuprins
Trading Plaintext-Awareness for Simulatability toAchieve Chosen Cipher Text Security.- Chosen-Cipher Text Security from SubsetSum.-mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">Onthe Hardness of Proving CCA-Security of Signed ElGamal.- CA-Secure Keyed-FullyHomomorphic Encryption.- On the Key Dependent Message Security of theFujisaki-Okamoto Constructions.- Extended Nested Dual System Groups,Revisited.- Functional Encryption for Inner Product with Full FunctionPrivacy.- Deniable Functional Encryption.- Identity-Based Cryptosystems andQuadratic Residuosity.- Identity-based Hierarchical Key-insulated Encryptionwithout Random Oracles.- Attribute-Based Signatures for Circuits from BilinearMap.- Efficient Unlinkable Sanitizable Signatures from Signatures withRe-Randomizable Keys.- Fault-Tolerant Aggregate Signatures.- DelegatableFunctional Signatures.- Mitigating Multi-Target Attacks in Hash-basedSignatures.- Nearly Optimal Verifiable Data Streaming.- ARMed SPHINCS Computinga 41 KB signature in 16 KB of RAM.
Caracteristici
Includes supplementary material: sn.pub/extras