38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings.
نام نخستين پديدآور
Yuval Ishai, Vincent Rijmen (eds.).
مشخصه جلد
Part I /
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham, Switzerland :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
2019.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (xxvii, 753 pages) :
ساير جزييات
illustrations (some color)
فروست
عنوان فروست
Lecture notes in computer science ;
عنوان فروست
LNCS sublibrary. SL 4, Security and cryptology
مشخصه جلد
11476
يادداشت کلی
متن يادداشت
Includes author index.
متن يادداشت
International conference proceedings.
یادداشتهای مربوط به مندرجات
متن يادداشت
ABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus -- Homomorphic primitives -- Standards -- Searchable encryption and ORAM -- Proofs of work and space -- Secure computation -- Quantum, secure computation and NIZK, Lattice-based cryptography -- Foundations -- Efficient secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.