Editors:
fast track conference proceedings
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6597)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): TCC: Theory of Cryptography Conference
Conference proceedings info: TCC 2011.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (37 papers)
-
Front Matter
-
Invited Talk 1
About this book
Keywords
- computational hardness
- conditional security
- cryptographic attacks
- digital signatures
- functional encryption
- hash functions
- multi-party computation
- oblivious transfer
- provable security
- pseudo-randomness
- quantum computing
- randomness
- zero-knowledge protocols
- algorithm analysis and problem complexity
Editors and Affiliations
-
Computer Science Department, Technion, Haifa, Israel
Yuval Ishai
Bibliographic Information
Book Title: Theory of Cryptography
Book Subtitle: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011, Proceedings
Editors: Yuval Ishai
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-19571-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2011
Softcover ISBN: 978-3-642-19570-9Published: 14 March 2011
eBook ISBN: 978-3-642-19571-6Published: 24 March 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 631
Topics: Cryptology, Computer Communication Networks, Data and Information Security, Coding and Information Theory, Mathematical Applications in Computer Science, Algorithms