Amazon cover image
Image from Amazon.com

Public-key cryptography-- PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings / Hugo Krawczyk (ed.).

By: (17th : International Workshop on Practice and Theory in Public Key Cryptography (17th : 2014 : Buenos Aires, Argentina)Contributor(s): Krawczyk, Hugo [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 8383. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Berlin : Springer, 2014Description: 1 online resource : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642546310; 3642546315Other title: PKC 2014 | Public-key cryptographySubject(s): Public key infrastructure (Computer security) -- Congresses | Data encryption (Computer science) -- Congresses | Data encryption (Computer science) | Public key infrastructure (Computer security)Genre/Form: Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Other classification: 54.62 Online resources: Click here to access online
Contents:
Chosen ciphertext security.-Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity- and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility.-Privacy -- Protocols.
Summary: This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Chosen ciphertext security.-Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity- and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility.-Privacy -- Protocols.

Powered by Koha