Normal view MARC view ISBD view

Public-Key Cryptography -- PKC 2014 [electronic resource] : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings / edited by Hugo Krawczyk.

Contributor(s): Krawczyk, Hugo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 8383Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Edition: 1st ed. 2014.Description: XIV, 686 p. 59 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642546310.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Coding theory | Information theory | Algorithms | Cryptology | Data and Information Security | Coding and Information Theory | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
    average rating: 0.0 (0 votes)
No physical items for this record

Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

There are no comments for this item.

Log in to your account to post a comment.