9783642400834-3642400833-Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (Security and Cryptology)

Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (Security and Cryptology)

ISBN-13: 9783642400834
ISBN-10: 3642400833
Edition: 2013
Author: Juan A. Garay, Ran Canetti
Publication date: 2013
Publisher: Springer
Format: Paperback 576 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783642400834
ISBN-10: 3642400833
Edition: 2013
Author: Juan A. Garay, Ran Canetti
Publication date: 2013
Publisher: Springer
Format: Paperback 576 pages

Summary

Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (Security and Cryptology) (ISBN-13: 9783642400834 and ISBN-10: 3642400833), written by authors Juan A. Garay, Ran Canetti, was published by Springer in 2013. With an overall rating of 3.9 stars, it's a notable title among other books. You can easily purchase or rent Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book