Theory of cryptography : 16th international conference, TCC 2018, Panaji, India, November 11-14, 2018 : proceedings
Author(s)
Bibliographic Information
Theory of cryptography : 16th international conference, TCC 2018, Panaji, India, November 11-14, 2018 : proceedings
(Lecture notes in computer science, 11239-11240 . LNCS sublibrary ; SL 4 . Security and cryptology)
Springer, c2018
- pt. 1
- pt. 2
Available at / 2 libraries
-
Tokyo Metropolitan University Library数学
pt. 1/549/L49c/1123910005259760,
pt. 2/549/L49c/1124010005259778 -
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and author index
Description and Table of Contents
- Volume
-
pt. 1 ISBN 9783030038069
Description
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Table of Contents
Memory-based functions and complexity theory.- Two-round MPC protocols.- Zero knowledge.- Information-theoretic cryptography.- Trapdoor permutations and signatures.- Coin-tossing and fairness.- Functional and identity-based encryption.
- Volume
-
pt. 2 ISBN 9783030038090
Description
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Table of Contents
MPC protocols.- Order-revealing encryption and symmetric encryption.- Information-theoretic cryptography II and quantum cryptography.- LWE-based cryptography.- iO and authentication.- ORAM and PRF.
by "Nielsen BookData"