Cantitate/Preț
Produs

Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II: Lecture Notes in Computer Science, cartea 10770

Editat de Michel Abdalla, Ricardo Dahab
en Limba Engleză Paperback – mar 2018
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018.
The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 39766 lei  43-57 zile
  Springer International Publishing – mar 2018 39766 lei  43-57 zile
  Springer International Publishing – mar 2018 40022 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 40022 lei

Nou

Puncte Express: 600

Preț estimativ în valută:
7083 8307$ 6210£

Carte tipărită la comandă

Livrare economică 26 ianuarie-09 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319765808
ISBN-10: 3319765809
Pagini: 740
Ilustrații: XIX, 760 p. 95 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Key-Dependent-Message and Selective-Opening Security.- Searchable and Fully Homomorphic Encryption.- Public-Key Encryption.- Encryption with Bad Randomness.- Subversion Resistance.- Cryptanalysis.- Composable Security.- Oblivious Transfer.- Multiparty Computation.- Signatures.- Structure-Preserving Signatures.- Functional Encryption.- Foundations.- Obfuscation-Based Cryptographic Constructions.- Protocols.- Blockchain.- Zero-Knowledge.- Lattices.