Scientific Library of Tomsk State University

   E-catalog        

Image from Google Jackets
Normal view MARC view

Public-Key Cryptography – PKC 2014 electronic resource 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings / edited by Hugo Krawczyk.

Contributor(s): Krawczyk, Hugo [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer SciencePublication details: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Description: XIV, 686 p. 59 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642546310Subject(s): Computer Science | Data protection | Data encryption (Computer science) | Coding theory | Computer software | Computer Science | Data Encryption | Systems and Data Security | Coding and Information Theory | Algorithm Analysis and Problem ComplexityDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

There are no comments on this title.

to post a comment.