Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11239)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: TCC 2018.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (25 papers)
-
Memory-Hard Functions and Complexity Theory
-
Two-Round MPC Protocols
-
Information-Theoretic Cryptography
Other volumes
-
Theory of Cryptography
-
Theory of Cryptography
Keywords
- authentication
- ciphertexts
- computer crime
- computer science
- cryptography
- data mining
- data privacy
- electronic document identification systems
- encryption
- hardware
- network security
- privacy
- privacy preserving
- probability
- project management
- public key cryptography
- secure multi-party computation
- semantics
- software engineering
- structural design
About this book
The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Editors and Affiliations
Bibliographic Information
Book Title: Theory of Cryptography
Book Subtitle: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
Editors: Amos Beimel, Stefan Dziembowski
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-03807-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2018
Softcover ISBN: 978-3-030-03806-9Published: 05 November 2018
eBook ISBN: 978-3-030-03807-6Published: 04 November 2018
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 720
Number of Illustrations: 69 b/w illustrations, 11 illustrations in colour
Topics: Cryptology, Systems and Data Security, Legal Aspects of Computing, Computers and Society, Computer Communication Networks, Management of Computing and Information Systems