Muutke küpsiste eelistusi

Advances in Cryptology CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III 1st ed. 2016 [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 651 pages, kõrgus x laius: 235x155 mm, kaal: 9942 g, 77 Illustrations, black and white; XIII, 651 p. 77 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9816
  • Ilmumisaeg: 21-Jul-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662530147
  • ISBN-13: 9783662530146
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 651 pages, kõrgus x laius: 235x155 mm, kaal: 9942 g, 77 Illustrations, black and white; XIII, 651 p. 77 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9816
  • Ilmumisaeg: 21-Jul-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662530147
  • ISBN-13: 9783662530146
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Provable security for symmetric cryptography.- Asymmetric cryptography and cryptanalysis.- Cryptography in theory and practice.- Compromised systems.- Symmetric cryptanalysis.- Algorithmic number theory.- Symmetric primitives.- Asymmetric cryptography.- Symmetric cryptography.- Cryptanalytic tools.- Hardware-oriented cryptography.- Secure computation and protocols.- Obfuscation.- Quantum techniques.- Spooky encryption.- IBE, ABE, and functional encryption.- Automated tools and synthesis.- Zero knowledge.- Theory.
Quantum Techniques
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
3(30)
Yfke Dulek
Christian Schaffner
Florian Speelman
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications
33(27)
Frederic Dupuis
Serge Fehr
Philippe Lamontagne
Louis Salvail
Semantic Security and Indistinguishability in the Quantum World
60(33)
Tommaso Gagliardoni
Andreas Hulsing
Christian Schaffner
Spooky Encryption
Spooky Encryption and Its Applications
93(30)
Yevgeniy Dodis
Shai Halevi
Ron D. Rothblum
Daniel Wichs
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems
123(26)
Cynthia Dwork
Moni Naor
Guy N. Rothblum
Secure Computation and Protocols II
Adaptively Secure Garbled Circuits from One-Way Functions
149(30)
Brett Hemenway
Zahra Jafargholi
Rafail Ostrovsky
Alessandra Scafuro
Daniel Wichs
Rate-1, Linear Time and Additively Homomorphic UC Commitments
179(29)
Ignacio Cascudo
Ivan Damgard
Bernardo David
Nico Dottling
Jesper Buus Nielsen
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
208(32)
Jan Camenisch
Maria Dubovitskaya
Alfredo Rial
Probabilistic Termination and Composability of Cryptographic Protocols
240(30)
Ran Cohen
Sandro Coretti
Juan Garay
Vassilis Zikas
Concurrent Non-Malleable Commitments (and More) in 3 Rounds
270(33)
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
IBE, ABE, and Functional Encryption
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
303(30)
Jiang Zhang
Yu Chen
Zhenfeng Zhang
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
333(30)
Shweta Agrawal
Benoit Libert
Damien Stehle
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
363(24)
Zvika Brakerski
Vinod Vaikuntanathan
Automated Tools and Synthesis
Design in Type-I, Run in Type-HJ: Fast and Scalable Bilinear-Type Conversion Using Integer Programming
387(29)
Masayuki Abe
Fumitaka Hoshino
Miyako Ohkubo
Linicrypt: A Model for Practical Cryptography
416(33)
Brent Carmer
Mike Rosulek
Zero Knowledge
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings
449(29)
Benny Applebaum
Pavel Raykov
How to Prove Knowledge of Small Secrets
478(21)
Carsten Baum
Ivan Damgard
Kasper Green Larsen
Michael Nielsen
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials
499(34)
Melissa Chase
Chaya Ganesh
Payman Mohassel
Theory
Fine-Grained Cryptography
533(30)
Akshay Degwekar
Vinod Vaikuntanathan
Prashant Nalini Vasudevan
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
563(30)
Sanjam Garg
Payman Mohassel
Charalampos Papamanthou
Bounded Indistinguishability and the Complexity of Recovering Secrets
593(26)
Andrej Bogdanov
Yuval Ishai
Emanuele Viola
Christopher Williamson
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
619(30)
Nico Dottling
Nils Fleischhacker
Johannes Krupp
Dominique Schroder
Author Index 649