Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9020)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: PKC 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (36 papers)
-
E-Cash
-
Password-Based Authentication
Other volumes
-
Public-Key Cryptography -- PKC 2015
Keywords
- Algorithms
- Authentication
- Cloud Storage
- Code-based Cryptography
- Cryptanalysis
- Cryptography
- Digital Signatures
- Elliptic Curve Cryptography
- Functional Encryption
- Gröbner Bases
- Pairing Based Cryptography
- Passwords
- Privacy
- Provable Security
- Public Key Encryption
- Re-encryption
- Security Protocols
- Simulation Based Security
- Zero-Knowledge Arguments
- algorithm analysis and problem complexity
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Public-Key Cryptography -- PKC 2015
Book Subtitle: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
Editors: Jonathan Katz
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-46447-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2015
Softcover ISBN: 978-3-662-46446-5Published: 19 March 2015
eBook ISBN: 978-3-662-46447-2Published: 16 March 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 824
Number of Illustrations: 123 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Algorithm Analysis and Problem Complexity, Management of Computing and Information Systems