TY - BOOK AU - Krawczyk,Hugo ED - SpringerLink (Online service) TI - Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783642546310 AV - QA76.9.A25 U1 - 005.82 23 PY - 2014/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg, Imprint: Springer KW - Computer Science KW - Data protection KW - Data encryption (Computer science) KW - Coding theory KW - Computer software KW - Data Encryption KW - Systems and Data Security KW - Coding and Information Theory KW - Algorithm Analysis and Problem Complexity N1 - Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols N2 - This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols UR - http://dx.doi.org/10.1007/978-3-642-54631-0 ER -