9783319968834-3319968831-Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991)

Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991)

ISBN-13: 9783319968834
ISBN-10: 3319968831
Edition: 1st ed. 2018
Author: Hovav Shacham, Alexandra Boldyreva
Publication date: 2018
Publisher: Springer
Format: Paperback 846 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783319968834
ISBN-10: 3319968831
Edition: 1st ed. 2018
Author: Hovav Shacham, Alexandra Boldyreva
Publication date: 2018
Publisher: Springer
Format: Paperback 846 pages

Summary

Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991) (ISBN-13: 9783319968834 and ISBN-10: 3319968831), written by authors Hovav Shacham, Alexandra Boldyreva, was published by Springer in 2018. With an overall rating of 4.0 stars, it's a notable title among other Business Technology (Information Theory, Computer Science, Internet & Networking, Hardware & DIY, Mathematical & Statistical, Software, Security & Encryption) books. You can easily purchase or rent Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991) (Paperback) from BooksRun, along with many other new and used Business Technology books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book