Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991)
ISBN-13:
9783319968834
ISBN-10:
3319968831
Edition:
1st ed. 2018
Author:
Hovav Shacham, Alexandra Boldyreva
Publication date:
2018
Publisher:
Springer
Format:
Paperback
846 pages
FREE US shipping
Book details
ISBN-13:
9783319968834
ISBN-10:
3319968831
Edition:
1st ed. 2018
Author:
Hovav Shacham, Alexandra Boldyreva
Publication date:
2018
Publisher:
Springer
Format:
Paperback
846 pages
Summary
Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991) (ISBN-13: 9783319968834 and ISBN-10: 3319968831), written by authors
Hovav Shacham, Alexandra Boldyreva, was published by Springer in 2018.
With an overall rating of 4.0 stars, it's a notable title among other
Business Technology
(Information Theory, Computer Science, Internet & Networking, Hardware & DIY, Mathematical & Statistical, Software, Security & Encryption) books. You can easily purchase or rent Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I (Lecture Notes in Computer Science, 10991) (Paperback) from BooksRun,
along with many other new and used
Business Technology
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}