Advances in Cryptology – EUROCRYPT 2012 [electronic resource] : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings / edited by David Pointcheval, Thomas Johansson.
By: Pointcheval, David [editor.].
Contributor(s): Johansson, Thomas [editor.] | SpringerLink (Online service).
Material type:
BookSeries: Lecture Notes in Computer Science: 7237Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012Description: XIV, 758 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642290114.Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Computational complexity | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Systems and Data Security | Algorithm Analysis and Problem Complexity | Discrete Mathematics in Computer Science | Management of Computing and Information SystemsDDC classification: 005.82 Online resources: Click here to access online
In:
Springer eBooksSummary: This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
There are no comments for this item.