libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

cheng chen-mou (curatore); chung kai-min (curatore); persiano giuseppe (curatore); yang bo-yin (curatore) - public-key cryptography – pkc 2016

Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 02/2016
Edizione: 1st ed. 2016





Trama

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.
The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.





Sommario

Trading Plaintext-Awareness for Simulatability to Achieve Chosen Cipher Text Security.- Chosen-Cipher Text Security from Subset Sum.-mso-fareast-theme-font: minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal.- CA-Secure Keyed-Fully Homomorphic Encryption.- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.- Extended Nested Dual System Groups, Revisited.- Functional Encryption for Inner Product with Full Function Privacy.- Deniable Functional Encryption.- Identity-Based Cryptosystems and Quadratic Residuosity.- Identity-based Hierarchical Key-insulated Encryption without Random Oracles.- Attribute-Based Signatures for Circuits from Bilinear Map.- Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys.- Fault-Tolerant Aggregate Signatures.- Delegatable Functional Signatures.- Mitigating Multi-Target Attacks in Hash-based Signatures.- Nearly Optimal Verifiable Data Streaming.- ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM.










Altre Informazioni

ISBN:

9783662493830

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIV, 472 p. 46 illus. in color.
Pagine Arabe: 472
Pagine Romane: xiv


Dicono di noi