Theory of Cryptography
Title | Theory of Cryptography PDF eBook |
Author | Martin Hirt |
Publisher | Springer |
Pages | 586 |
Release | 2016-10-24 |
Genre | Computers |
ISBN | 3662536447 |
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.
Theory of Cryptography
Title | Theory of Cryptography PDF eBook |
Author | Amos Beimel |
Publisher | Springer |
Pages | 739 |
Release | 2018-11-07 |
Genre | Computers |
ISBN | 3030038106 |
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Security and Cryptography for Networks
Title | Security and Cryptography for Networks PDF eBook |
Author | Vassilis Zikas |
Publisher | Springer |
Pages | 606 |
Release | 2016-08-10 |
Genre | Computers |
ISBN | 3319446185 |
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
Advances in Cryptology – ASIACRYPT 2022
Title | Advances in Cryptology – ASIACRYPT 2022 PDF eBook |
Author | Shweta Agrawal |
Publisher | Springer Nature |
Pages | 846 |
Release | 2023-01-24 |
Genre | Computers |
ISBN | 3031229630 |
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Advances in Cryptology – CRYPTO 2019
Title | Advances in Cryptology – CRYPTO 2019 PDF eBook |
Author | Alexandra Boldyreva |
Publisher | Springer |
Pages | 864 |
Release | 2019-08-09 |
Genre | Computers |
ISBN | 303026954X |
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019. The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections: Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse. Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations. Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.
Innovative Security Solutions for Information Technology and Communications
Title | Innovative Security Solutions for Information Technology and Communications PDF eBook |
Author | Peter Y.A. Ryan |
Publisher | Springer Nature |
Pages | 345 |
Release | 2022-10-12 |
Genre | Computers |
ISBN | 3031175107 |
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021. The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.
Advances in Cryptology -- CRYPTO 2014
Title | Advances in Cryptology -- CRYPTO 2014 PDF eBook |
Author | Juan A. Garay |
Publisher | Springer |
Pages | 589 |
Release | 2014-07-14 |
Genre | Computers |
ISBN | 3662443716 |
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.