Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Theory of Cryptography

E-BookPDF1 - PDF WatermarkE-Book
812 Seiten
Englisch
Springer International Publishingerschienen am04.11.20171st ed. 2017
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.

The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR106,99
E-BookPDF1 - PDF WatermarkE-Book
EUR96,29
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextThe two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.

The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Details
Weitere ISBN/GTIN9783319705002
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Erscheinungsjahr2017
Erscheinungsdatum04.11.2017
Auflage1st ed. 2017
Reihen-Nr.10677
Seiten812 Seiten
SpracheEnglisch
IllustrationenXVII, 812 p. 80 illus.
Artikel-Nr.5848951
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
Impossibilities and Barriers.- Obfuscation.- Functional Encryption.- Constrained PRFs.- Encryption.- Moderately Hard Functions.- Blockchains.- Multiparty Computation.- Garbled Circuits and Oblivious RAM.- Zero-Knowledge and Non-Malleability.- Leakage and Tampering.- Delegation.- Non-Malleable Codes.- Secret Sharing.- OT Combiners.- Signatures.- Verifiable Random Functions.- Fully Homomorphic Encryption.- Database Privacy.- Assumptions.mehr