Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II

Author:   Serge Fehr
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1st ed. 2017
Volume:   10175
ISBN:  

9783662543870


Pages:   556
Publication Date:   26 February 2017
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II


Add your own review!

Overview

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Full Product Details

Author:   Serge Fehr
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1st ed. 2017
Volume:   10175
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   0.866kg
ISBN:  

9783662543870


ISBN 10:   3662543877
Pages:   556
Publication Date:   26 February 2017
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

 Cryptanalysis, Protocols.-  Encryption Schemes.- Leakage-Resilient and Non-Malleable Codes.- Number Theory and Die-Hellman.- Encryption with Access Control.-  Special Signatures.-  Fully Homomorphic Encryption.- Real-World Schemes.-  Multiparty Computation.- Primitives.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List