Advances in cryptology - EUROCRYPT 2...
Oswald, Elisabeth.

FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - EUROCRYPT 2015 = 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advances in cryptology - EUROCRYPT 2015/ edited by Elisabeth Oswald, Marc Fischlin.
    其他題名: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015 : proceedings.
    其他題名: EUROCRYPT 2015
    其他作者: Oswald, Elisabeth.
    出版者: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2015.,
    面頁冊數: xviii, 838 p. :ill., digital ;24 cm.
    內容註: Universal Signature Aggregators -- Fully Structure-Preserving Signatures and Shrinking Commitments -- Disjunctions for Hash Proof Systems: New Constructions and Applications -- Quasi-Adaptive NIZK for Linear Subspaces Revisited -- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware -- Noisy Leakage -- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge -- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates -- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin -- The Bitcoin Backbone Protocol: Analysis and Applications -- Linear Secret Sharing Schemes from Error Correcting Codes -- Function Secret Sharing -- Cluster Computing in Zero Knowledge -- Hosting Services on an Untrusted Cloud -- How to Obfuscate Programs Directly -- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World -- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation -- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings -- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model -- Cryptographic Reverse Firewalls -- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols -- Authenticated Key Exchange from Ideal Lattices -- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model -- Privacy Amplification in the Isolated Qubits Model -- Generic Hardness of the Multiple Discrete Logarithm Problem.
    Contained By: Springer eBooks
    標題: Data encryption (Computer science) -
    電子資源: http://dx.doi.org/10.1007/978-3-662-46803-6
    ISBN: 9783662468036 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9270112 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E89 2015 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入