Advances in Cryptology - EUROCRYPT 2017 [electronic resource] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I / edited by Jean-Sébastien Coron, Jesper Buus Nielsen.
Contributor(s): Coron, Jean-Sébastien [editor.] | Nielsen, Jesper Buus [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10210Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XXIII, 709 p. 76 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319566207.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Electronic data processing -- Management | Software engineering | Computer science -- Mathematics | Discrete mathematics | Cryptology | Data and Information Security | IT Operations | Software Engineering | Discrete Mathematics in Computer ScienceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access onlineLattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
There are no comments for this item.