wyszukanych pozycji: 3
Advances in Cryptology - Eurocrypt 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denm
ISBN: 9783540259107 / Angielski / Miękka / 2005 / 578 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Contains the refereed proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, held in Aarhus, Denmark in May 2005. This work has papers that are organized in topical sections on cryptanalysis, encryption, signatures and authentication, algebra and number theory, and more.
Contains the refereed proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 20...
|
|
cena:
385,52 zł |
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ISBN: 9783642289132 / Angielski / Miękka / 2012 / 656 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
|
|
cena:
192,74 zł |
Secure Multiparty Computation and Secret Sharing
ISBN: 9781107043053 / Angielski / Twarda / 2015 / 381 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties ...
|
|
cena:
329,95 zł |