Advances in Cryptology - EUROCRYPT 2012 [electronic resource] : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings / edited by David Pointcheval, Thomas Johansson.
Contributor(s): Pointcheval, David [editor.] | Johansson, Thomas [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 7237Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XIV, 758 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642290114.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks | Data protection | Algorithms | Computer science -- Mathematics | Discrete mathematics | Electronic data processing -- Management | Cryptology | Computer Communication Networks | Data and Information Security | Algorithms | Discrete Mathematics in Computer Science | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
There are no comments for this item.