Advances in Cryptology – CRYPTO 2017

37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – CRYPTO 2017 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319636887
Publisher: Springer International Publishing Publication: August 8, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319636887
Publisher: Springer International Publishing
Publication: August 8, 2017
Imprint: Springer
Language: English

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.

The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.

The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

More books from Springer International Publishing

Cover of the book Applied Clinical Pharmacokinetics and Pharmacodynamics of Psychopharmacological Agents by
Cover of the book Short Stay Management of Atrial Fibrillation by
Cover of the book Ambient Assisted Living. ICT-based Solutions in Real Life Situations by
Cover of the book Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection by
Cover of the book The Diagnosis and Treatment of Male Infertility by
Cover of the book Decision Models in Engineering and Management by
Cover of the book Design of Experiments for Reinforcement Learning by
Cover of the book Obsessive-Compulsive Symptoms in Schizophrenia by
Cover of the book Digital Research and Education in Architectural Heritage by
Cover of the book Exploring Animal Encounters by
Cover of the book Sustainable Wireless Networks by
Cover of the book Algorithms for Next-Generation Sequencing Data by
Cover of the book Smart Card Research and Advanced Applications by
Cover of the book The Data Team™ Procedure: A Systematic Approach to School Improvement by
Cover of the book Information Security and Cryptology - ICISC 2014 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy