Amazon cover image
Image from Amazon.com

Theory of cryptography : 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings / Daniele Micciancio (ed.).

By: (7th : Theory of Cryptography Conference (7th : 2010 : Zurich, Switzerland)Contributor(s): Micciancio, DanieleMaterial type: TextTextPublisher number: 12990504Series: Serienbezeichnung | Lecture notes in computer science ; 5978. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2010. Description: 1 online resource (xii, 605 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642117992; 3642117996Other title: TCC 2010Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Cryptography -- Congresses | Computer security | Computer Security | Computer Science | Data Encryption | Computer Communication Networks | Coding and Information Theory | Systems and Data Security | Math Applications in Computer Science | Algorithm Analysis and Problem Complexity | Sécurité informatique -- Congrès | Chiffrement (Informatique) -- Congrès | Cryptographie -- Congrès | Sécurité informatique | Informatique | Computer security | Cryptography | Data encryption (Computer science) | KryptologieGenre/Form: Congress | Electronic books. | Conference papers and proceedings. | Conference papers and proceedings. | Actes de congrès. | Kongress. | Zürich (2010) Additional physical formats: Print version:: Theory of cryptography.DDC classification: 004 LOC classification: QA76.9.A25 | T44 2010NLM classification: QA 76.9.A25Other classification: SS 4800 Online resources: Click here to access online
Contents:
Parallel repetition -- Obfuscation -- Multiparty computation -- CCA security -- Threshold cryptography and secret sharing -- Symmetric cryptography -- Key-leakage and tamper-resistance -- Rationality and privacy -- Public-key encryption -- Zero-knowledge.
Summary: This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook_LNCS Available
Total holds: 0

Includes bibliographical references and author index.

Parallel repetition -- Obfuscation -- Multiparty computation -- CCA security -- Threshold cryptography and secret sharing -- Symmetric cryptography -- Key-leakage and tamper-resistance -- Rationality and privacy -- Public-key encryption -- Zero-knowledge.

Print version record.

This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.

Powered by Koha