|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466312903316 |
|
|
Titolo |
Public-Key Cryptography – PKC 2019 [[electronic resource] ] : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I / / edited by Dongdai Lin, Kazue Sako |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVII, 614 p. 926 illus., 13 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 11442 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer organization |
Computers and civilization |
Computers |
Law and legislation |
Software engineering |
Coding theory |
Information theory |
Cryptology |
Computer Systems Organization and Communication Networks |
Computers and Society |
Legal Aspects of Computing |
Software Engineering |
Coding and Information Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Cryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography -- Re- Encryption Schemes -- Post Quantum Cryptography. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice |
|
|
|
|
|
|
|
|
|
|
and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography. |
|
|
|
|
|
| |