buchspektrum Internet-Buchhandlung

Neuerscheinungen 2017

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Jean-Sébastien Coron, Jesper Buus Nielsen (Beteiligte)

Advances in Cryptology - EUROCRYPT 2017


36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II
Herausgegeben von Coron, Jean-Sébastien; Nielsen, Jesper Buus
1st ed. 2017. 2017. xxi, 677 S. 66 SW-Abb. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER INTERNATIONAL PUBLISHING 2017
ISBN: 3-319-56613-X (331956613X)
Neue ISBN: 978-3-319-56613-9 (9783319566139)

Preis und Lieferzeit: Bitte klicken


The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
Lattice attacks and constructions.- Obfuscation and functional encryption.- Discrete logarithm.- Multiparty computation.- Universal composability.- Zero knowledge.- Side-channel attacks and countermeasures.- Functional encryption.- Elliptic curves.- Symmetric cryptanalysis.- Provable security for symmetric cryptography.- security models:- Blockchain.- Memory hard functions.- Symmetric-key constructions.- Obfuscation.- Quantum cryptography.- Public-key encryption and key-exchange.