Atjaunināt sīkdatņu piekrišanu

Advances in Cryptology EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II 1st ed. 2018 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 805 pages, height x width: 235x155 mm, weight: 1246 g, 105 Illustrations, black and white; XIX, 805 p. 105 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10821
  • Izdošanas datums: 01-Apr-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319783742
  • ISBN-13: 9783319783741
  • Mīkstie vāki
  • Cena: 89,76 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 105,60 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 805 pages, height x width: 235x155 mm, weight: 1246 g, 105 Illustrations, black and white; XIX, 805 p. 105 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10821
  • Izdošanas datums: 01-Apr-2018
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319783742
  • ISBN-13: 9783319783741
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.

The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.