Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

ISBN-10:
3319705024
ISBN-13:
9783319705026
Pub. Date:
12/10/2017
Publisher:
Springer International Publishing
ISBN-10:
3319705024
ISBN-13:
9783319705026
Pub. Date:
12/10/2017
Publisher:
Springer International Publishing
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.

The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.


Product Details

ISBN-13: 9783319705026
Publisher: Springer International Publishing
Publication date: 12/10/2017
Series: Lecture Notes in Computer Science , #10678
Edition description: 1st ed. 2017
Pages: 778
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Impossibilities and Barriers.- Obfuscation.- Functional Encryption.- Constrained PRFs.- Encryption.- Moderately Hard Functions.- Blockchains.- Multiparty Computation.- Garbled Circuits and Oblivious RAM.- Zero-Knowledge and Non-Malleability.- Leakage and Tampering.- Delegation.- Non-Malleable Codes.- Secret Sharing.- OT Combiners.- Signatures.- Verifiable Random Functions.- Fully Homomorphic Encryption.- Database Privacy.- Assumptions.
From the B&N Reads Blog

Customer Reviews