|
|
|
|
LEADER |
02392nmm a2200409 u 4500 |
001 |
EB001346534 |
003 |
EBX01000000000000000900724 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
170301 ||| eng |
020 |
|
|
|a 9783662543658
|
100 |
1 |
|
|a Fehr, Serge
|e [editor]
|
245 |
0 |
0 |
|a Public-Key Cryptography – PKC 2017
|h Elektronische Ressource
|b 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I
|c edited by Serge Fehr
|
250 |
|
|
|a 1st ed. 2017
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2017, 2017
|
300 |
|
|
|a XIV, 466 p. 32 illus
|b online resource
|
505 |
0 |
|
|a Cryptanalysis, Protocols -- Encrpytion Schemes -- Leakage-Resilient and Non-Malleable Codes -- Number Theory and Die-Hellman -- Encryption with Access Control -- Special Signatures -- Fully Homomorphic Encryption -- Real-World Schemes -- Multiparty Computation -- Primitives
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-662-54365-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-662-54365-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives
|