Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Title
Advances in Cryptology - CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III / edited by Hovav Shacham, Alexandra Boldyreva.
ISBN
9783319968780
3319968785
9783319968773
Published
Cham : Springer International Publishing : Imprint: Springer, 2018.
Language
English
Description
1 online resource (xv, 787 pages) : illustrations.
Item Number
10.1007/978-3-319-96878-0 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.82
Summary
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Series
Lecture notes in computer science ; 10993.
Available in Other Form
Print version: 9783319968773
Secure messaging
Implementations and physical attacks prevention
Authenticated and format-preserving encryption
Cryptoanalysis
Searchable encryption and differential privacy
Secret sharing
Encryption
Symmetric cryptography
Proofs of work and proofs of Stake
Proof tools
Key exchange
Symmetric cryptoanalysis
Hashes and random oracles
Trapdoor functions
Round optimal MPC
Foundations
Lattices
Lattice-based ZK
Efficient MPC
Quantum cryptography
MPC
Garbling
Information-theoretic MPC
Oblivious transfer
Non-malleable codes
Zero knowledge
Obfuscation.