Atjaunināt sīkdatņu piekrišanu

Advances in Cryptology EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 1014, 2020, Proceedings, Part III 2020 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 821 pages, height x width: 235x155 mm, weight: 1264 g, 33 Illustrations, color; 551 Illustrations, black and white; XV, 821 p. 584 illus., 33 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12107
  • Izdošanas datums: 02-May-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030457265
  • ISBN-13: 9783030457266
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 821 pages, height x width: 235x155 mm, weight: 1264 g, 33 Illustrations, color; 551 Illustrations, black and white; XV, 821 p. 584 illus., 33 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12107
  • Izdošanas datums: 02-May-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030457265
  • ISBN-13: 9783030457266
Citas grāmatas par šo tēmu:
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic.





The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
Asymmetric Cryptanalysis.- Verifiable Delay Functions.- Signatures.- Attribute-Based Encryption.- Side-Channel Security.- Non-Interactive Zero-Knowledge.- Public-Key Encryption.- Zero-Knowledge.- Quantum II.