Advances in Cryptology - CRYPTO 2016, 1st ed. 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I Security and Cryptology Series
Coordonnateurs : Robshaw Matthew, Katz Jonathan
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.
The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.Provable security for symmetric cryptography.- Asymmetric cryptography and cryptanalysis.- Cryptography in theory and practice.- Compromised systems.- Symmetric cryptanalysis.- Algorithmic number theory.- Symmetric primitives.- Asymmetric cryptography.- Symmetric cryptography.- Cryptanalytic tools.- Hardware-oriented cryptography.- Secure computation and protocols.- Obfuscation.- Quantum techniques.- Spooky encryption.- IBE, ABE, and functional encryption.- Automated tools and synthesis.- Zero knowledge.- Theory.
Includes supplementary material: sn.pub/extras
Date de parution : 07-2016
Ouvrage de 685 p.
15.5x23.5 cm
Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).
Prix indicatif 52,74 €
Ajouter au panierThèmes d’Advances in Cryptology - CRYPTO 2016 :
Mots-clés :
formal methods; implementation security; public key techniques; symmetric cryptography; authenticated encryption; cryptanalysis and other attacks; cryptography; deployment security; hash functions; homomorphic encryption; integer programming; lightweight cryptography; mathematical foundations of cryptography; needles in haystacks; post-quantum cryptography; privacy-preserving protocols; secure computation; supersingular elliptic curves; zero-knowledge; algorithm analysis and problem complexity