9783319636870-3319636871-Advances in Cryptology – CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I (Security and Cryptology)

Advances in Cryptology – CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I (Security and Cryptology)

ISBN-13: 9783319636870
ISBN-10: 3319636871
Edition: 1st ed. 2017
Author: Jonathan Katz, Hovav Shacham
Publication date: 2017
Publisher: Springer
Format: Paperback 808 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783319636870
ISBN-10: 3319636871
Edition: 1st ed. 2017
Author: Jonathan Katz, Hovav Shacham
Publication date: 2017
Publisher: Springer
Format: Paperback 808 pages

Summary

Advances in Cryptology – CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I (Security and Cryptology) (ISBN-13: 9783319636870 and ISBN-10: 3319636871), written by authors Jonathan Katz, Hovav Shacham, was published by Springer in 2017. With an overall rating of 4.1 stars, it's a notable title among other books. You can easily purchase or rent Advances in Cryptology – CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book