9783662490952-3662490951-Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (Security and Cryptology)

Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (Security and Cryptology)

ISBN-13: 9783662490952
ISBN-10: 3662490951
Edition: 1st ed. 2016
Author: Eyal Kushilevitz, Tal Malkin
Publication date: 2016
Publisher: Springer
Format: Paperback 632 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783662490952
ISBN-10: 3662490951
Edition: 1st ed. 2016
Author: Eyal Kushilevitz, Tal Malkin
Publication date: 2016
Publisher: Springer
Format: Paperback 632 pages

Summary

Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (Security and Cryptology) (ISBN-13: 9783662490952 and ISBN-10: 3662490951), written by authors Eyal Kushilevitz, Tal Malkin, was published by Springer in 2016. With an overall rating of 4.2 stars, it's a notable title among other books. You can easily purchase or rent Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. 

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book