The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Prools; Blockchain; Zero-Knowledge; Lattices.
The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Prools; Blockchain; Zero-Knowledge; Lattices.
Public-Key Cryptography - PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II
760
Public-Key Cryptography - PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II
760Paperback(1st ed. 2018)
Product Details
| ISBN-13: | 9783319765808 |
|---|---|
| Publisher: | Springer International Publishing |
| Publication date: | 04/06/2018 |
| Series: | Lecture Notes in Computer Science , #10770 |
| Edition description: | 1st ed. 2018 |
| Pages: | 760 |
| Product dimensions: | 6.10(w) x 9.25(h) x (d) |