Advances in cryptology -- EUROCRYPT 2016 [electronic resource] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings. Part I / Marc Fischlin, Jean-Sébastien Coron (eds.).
2016
QA76.9.A25 .E97 2016eb
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Advances in cryptology -- EUROCRYPT 2016 [electronic resource] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings. Part I / Marc Fischlin, Jean-Sébastien Coron (eds.).
ISBN
9783662498903 (electronic book)
3662498901 (electronic book)
9783662498897
3662498901 (electronic book)
9783662498897
Published
Berlin : Springer, 2016.
Language
English
Description
1 online resource (xxviii, 853 pages) : illustrations.
Item Number
10.1007/978-3-662-49890-3 doi
Call Number
QA76.9.A25 .E97 2016eb
Dewey Decimal Classification
005.8/2
Summary
The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed May 4, 2016).
Series
Lecture notes in computer science ; 9665.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
(Pseudo)randomness
LPN/LWE
Cryptanalysis
Masking
Fully homomorphic encryption
Number theory
Hash functions
Multilinear maps
Message authentification codes
Attacks on SSL/TLS
Real-world protocols
Robust designs
Lattice reduction.
LPN/LWE
Cryptanalysis
Masking
Fully homomorphic encryption
Number theory
Hash functions
Multilinear maps
Message authentification codes
Attacks on SSL/TLS
Real-world protocols
Robust designs
Lattice reduction.