Theory of cryptography = 14th Intern...
Theory of Cryptography Conference (2016 :)

FindBook      Google Book      Amazon      博客來     
  • Theory of cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Theory of cryptography/ edited by Martin Hirt, Adam Smith.
    其他題名: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.
    其他題名: TCC 2016-B
    其他作者: Hirt, Martin.
    團體作者: Theory of Cryptography Conference
    出版者: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2016.,
    面頁冊數: xvi, 692 p. :ill., digital ;24 cm.
    內容註: TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back) -- Foundations -- Fast Pseudorandom Functions Based on Expander Graphs -- 3-Message Zero Knowledge Against Human Ignorance -- The GGM Function Family is a Weakly One-Way Family of Functions -- On the (In)security of SNARKs in the Presence of Oracles -- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting -- Simulating Auxiliary Inputs, Revisited -- Unconditional Security -- Pseudoentropy: Lower-bounds for Chain rules and Transformations -- Oblivious Transfer from Any Non-Trivial Elastic Noisy Channel via Secret Key Agreement -- Simultaneous Secrecy and Reliability Amplification for a General Channel Model -- Proof of Space from Stacked Expanders -- Perfectly Secure Message Transmission in Two Rounds -- Foundations of Multi-Party Protocols -- Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious -- Binary AMD Circuits from Secure Multiparty Computation -- Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity -- Composable Adaptive Secure Protocols without Setup under Polytime Assumptions -- Adaptive Security of Yao's Garbled Circuits -- Round Complexity and Efficiency of Multi-Party Computation -- Efficient Secure Multiparty Computation with Identifiable Abort -- Secure Multiparty RAM Computation in Constant Rounds -- Constant-Round Maliciously Secure Two-Party Computation in the RAM Model -- More Efficient Constant-Round Multi-Party Computation from BMR and SHE -- Cross&Clean: Amortized Garbled Circuits With Constant Overhead -- Differential Privacy -- Separating Computational and Statistical Differential Privacy in the Client-Server Model -- Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds -- Strong Hardness of Privacy from Weak Traitor Tracing.
    Contained By: Springer eBooks
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-3-662-53641-4
    ISBN: 9783662536414
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入