Public-Key Cryptography – PKC 2017

20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Public-Key Cryptography – PKC 2017 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662543658
Publisher: Springer Berlin Heidelberg Publication: February 24, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783662543658
Publisher: Springer Berlin Heidelberg
Publication: February 24, 2017
Imprint: Springer
Language: English

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

More books from Springer Berlin Heidelberg

Cover of the book Hamilton-Jacobi Equations: Approximations, Numerical Analysis and Applications by
Cover of the book Synthetic Musk Fragrances in the Environment by
Cover of the book Complications of Cancer Chemotherapy by
Cover of the book Cerebral Ischemia and Dementia by
Cover of the book Helicene Chemistry by
Cover of the book SAP R/3 Implementation by
Cover of the book Chirality and Life by
Cover of the book Economics and the Interpretation and Application of U.S. and E.U. Antitrust Law by
Cover of the book Breast Cancer Screening in Europe by
Cover of the book Integrierte Business-Informationssysteme by
Cover of the book Dental Caries by
Cover of the book Statistical Methods in Toxicology by
Cover of the book Protein Structure Analysis by
Cover of the book The Application of the Chebyshev-Spectral Method in Transport Phenomena by
Cover of the book Kompendium angeborene Herzfehler bei Kindern by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy