Public-key cryptography - PKC 2017 : 20th IACR International Conference on Practice and Theory in Public Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 ; proceedings
著者
書誌事項
Public-key cryptography - PKC 2017 : 20th IACR International Conference on Practice and Theory in Public Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017 ; proceedings
(Lecture notes in computer science, 10174-10175 . LNCS sublibrary ; SL 4 . Security and cryptology)
Springer, c2017
- part 1
- part 2
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
内容説明・目次
- 巻冊次
-
part 1 ISBN 9783662543641
内容説明
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
目次
Cryptanalysis, Protocols.- Encrpytion Schemes.- Leakage-Resilient and Non-Malleable Codes.- Number Theory and Die-Hellman.- Encryption with Access Control.- Special Signatures.- Fully Homomorphic Encryption.- Real-World Schemes.- Multiparty Computation.- Primitives.
- 巻冊次
-
part 2 ISBN 9783662543870
内容説明
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
目次
Cryptanalysis, Protocols.- Encryption Schemes.- Leakage-Resilient and Non-Malleable Codes.- Number Theory and Die-Hellman.- Encryption with Access Control.- Special Signatures.- Fully Homomorphic Encryption.- Real-World Schemes.- Multiparty Computation.- Primitives.
「Nielsen BookData」 より