Deze website maakt gebruik van cookies. Klik hier voor meer informatie.X sluit
Uitgebreid zoeken
Boek

Theory Of Cryptography

7th Theory Of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings

Theory Of Cryptography - Micciancio, Daniele (EDT) - ISBN: 9783642117985
Prijs: € 137,55
Levertijd: 4 tot 6 werkdagen
Bindwijze: Boek
Genre: Informatiekunde
Boekenliefde.nl:
Theory Of Cryptography op boekenliefde.nl
Add to cart

Beschrijving

This Book Constitutes The Refereed Proceedings Of The Seventh Theory Of Cryptography Conference, Tcc 2010, Held In Zurich, Switzerland, February 9-11, 2010.

Details

Titel: Theory Of Cryptography
auteur: Micciancio, Daniele (EDT)
Mediatype: Boek
Taal: Engels
Aantal pagina's: 610
Uitgever: Springer-verlag Berlin And Heidelberg Gmbh & Co. Kg
Plaats van publicatie: 04
NUR: Informatiekunde
Afmetingen: 235 x 155
Gewicht: 943 gr
ISBN/ISBN13: 9783642117985
Intern nummer: 14126696

Inhoudsopgave

Parallel Repetition.- An Efficient Parallel Repetition Theorem.- Parallel Repetition Theorems for Interactive Arguments.- Almost Optimal Bounds for Direct Product Threshold Theorem.- Obfuscation.- On Symmetric Encryption and Point Obfuscation.- Obfuscation of Hyperplane Membership.- Invited Talk.- Secure Computation and Its Diverse Applications.- Multiparty Computation.- On Complete Primitives for Fairness.- On the Necessary and Sufficient Assumptions for UC Computation.- From Passive to Covert Security at Low Cost.- CCA Security.- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems.- Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs.- Threshold Cryptography and Secret Sharing.- Efficient, Robust and Constant-Round Distributed RSA Key Generation.- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems.- Ideal Hierarchical Secret Sharing Schemes.- Symmetric Cryptography.- A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.- On Related-Secret Pseudorandomness.- A Domain Extender for the Ideal Cipher.- Delayed-Key Message Authentication for Streams.- Key-Leakage and Tamper-Resistance.- Founding Cryptography on Tamper-Proof Hardware Tokens.- Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.- Leakage-Resilient Signatures.- Public-Key Encryption Schemes with Auxiliary Inputs.- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum.- Rationality and Privacy.- Rationality in the Full-Information Model.- Efficient Rational Secret Sharing in Standard Communication Networks.- Bounds on the Sample Complexity for Private Learning and Private Data Release.- Public-Key Encryption.- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.- Robust Encryption.- Invited Talk.- Privacy-Enhancing Cryptography: From Theory into Practice.- Zero-Knowledge.- Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.- Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model.- Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge.- Efficiency Limitations for ?-Protocols for Group Homomorphisms.- Composition of Zero-Knowledge Proofs with Efficient Provers.- Private Coins versus Public Coins in Zero-Knowledge Proof Systems.

Winkelvoorraad

Dit product is op dit moment niet op voorraad in een van onze vestigingen.