Advances in cryptology -- EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings. Part II / Marc Fischlin, Jean-Sébastien Coron (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 9666. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Berlin : Springer, 2016Description: 1 online resource (xx, 911 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783662498965
- 3662498960
- 3662498952
- 9783662498958
- EUROCRYPT 2016
- Data encryption (Computer science) -- Congresses
- Computer security -- Congresses
- Computer networks -- Security measures -- Congresses
- Chiffrement (Informatique) -- Congrès
- Sécurité informatique -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Computer networks -- Security measures
- Computer security
- Data encryption (Computer science)
- 005.8/2 23
- QA76.9.A25 .E97 2016eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed May 4, 2016).
Latticed-based schemes -- Zero-knowledge -- Pseudorandom functions -- Multi-party computation -- Separations -- Protocols -- Round complexity -- Commitments -- Lattices -- Leakage -- In differentiability -- Obfuscation -- Automated analysis, functional encryption, and non-malleable codes.
The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.
English.