Advances in Cryptology - EUROCRYPT 2011 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings / [electronic resource] :
edited by Kenneth G. Paterson.
- 1st ed. 2011.
- XIV, 628 p. 77 illus., 18 illus. in color. online resource.
- Security and Cryptology, 6632 2946-1863 ; .
- Security and Cryptology, 6632 .
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011. The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.
9783642204654
10.1007/978-3-642-20465-4 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Algorithms.
Computer science--Mathematics.
Discrete mathematics.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Algorithms.
Discrete Mathematics in Computer Science.
IT Operations.
QA268
005.824
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011. The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.
9783642204654
10.1007/978-3-642-20465-4 doi
Cryptography.
Data encryption (Computer science).
Computer networks .
Data protection.
Algorithms.
Computer science--Mathematics.
Discrete mathematics.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Data and Information Security.
Algorithms.
Discrete Mathematics in Computer Science.
IT Operations.
QA268
005.824