Public-Key Cryptography PKC 2015:18th IACR International Conference On Practice
US $99.32
Condition:
Very Good
A book that does not look new and has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket (if applicable) included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Standard Shipping.
Located in: Springfield, Missouri, United States
Delivery:
Estimated between Wed, Apr 16 and Mon, Apr 21 to 43230
Returns:
Seller does not accept returns.
Payments:
Special financing available. See terms and apply now- for PayPal Credit, opens in a new window or tab
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:185350527935
Item specifics
- Condition
- Book Title
- Public-key Cryptography Pkc 2015 : 18th Iacr International Confer
- ISBN
- 9783662464465
- Subject Area
- Computers, Language Arts & Disciplines
- Publication Name
- Public-Key Cryptography -- PKC 2015 : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
- Publisher
- Springer Berlin / Heidelberg
- Item Length
- 9.3 in
- Subject
- Communication Studies, Information Theory, Security / Cryptography, Security / General
- Publication Year
- 2015
- Series
- Lecture Notes in Computer Science Ser.
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Weight
- 439.3 Oz
- Item Width
- 6.1 in
- Number of Pages
- Xiv, 824 Pages
About this product
Product Identifiers
Publisher
Springer Berlin / Heidelberg
ISBN-10
3662464462
ISBN-13
9783662464465
eBay Product ID (ePID)
208648915
Product Key Features
Number of Pages
Xiv, 824 Pages
Language
English
Publication Name
Public-Key Cryptography -- PKC 2015 : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
Publication Year
2015
Subject
Communication Studies, Information Theory, Security / Cryptography, Security / General
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Series
Lecture Notes in Computer Science Ser.
Format
Trade Paperback
Dimensions
Item Weight
439.3 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2015-933270
Dewey Edition
23
Series Volume Number
9020
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
Public-Key Encryption.- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.- On the Selective Opening Security of Practical Public-Key Encryption Schemes.- How Secure is Deterministic Encryption'.- E-Cash.- Divisible E-Cash Made Practical.- Anonymous Transferable E-Cash.- Cryptanalysis.- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.- A Polynomial-Time Attack on the BBCRS Scheme.- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case.- Digital Signatures.- Digital Signatures from Strong RSA without Prime Generation.- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.- Tightly-Secure Signatures from Chameleon Hash Functions.- Password-Based Authentication.- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.- Pairing-Based Cryptography.- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.- Digital Signatures.- Simpler Efficient Group Signatures from Lattices.- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.- Efficient Constructions.- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.- Additively Homomorphic UC Commitments with Optimal Amortized Overhead.- Interactive Message-Locked Encryption and Secure Deduplication.- Faster ECC over F2521_1.- Cryptography with Imperfect Keys.- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.- A Tamper and Leakage Resilient von Neumann Architecture.- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.- Interactive Proofs.- Adaptive Proofs of Knowledge in the Random Oracle Model.- Making Sigma-Protocols Non-interactive Without Random Oracles.- Lattice-Based Cryptography.- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.- Packing Messages and Optimizing Bootstrapping in GSW-FHE.- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products.- Predicate Encryption for Multi-Dimensional Range Queries from Lattices.- On the Practical Security of Inner Product Functional Encryption.- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Synopsis
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption., Public-Key Encryption.- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.- On the Selective Opening Security of Practical Public-Key Encryption Schemes.- How Secure is Deterministic Encryption?.- E-Cash.- Divisible E-Cash Made Practical.- Anonymous Transferable E-Cash.- Cryptanalysis.- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.- A Polynomial-Time Attack on the BBCRS Scheme.- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case.- Digital Signatures.- Digital Signatures from Strong RSA without Prime Generation.- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.- Tightly-Secure Signatures from Chameleon Hash Functions.- Password-Based Authentication.- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.- Pairing-Based Cryptography.- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.- Digital Signatures.- Simpler Efficient Group Signatures from Lattices.- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.- Efficient Constructions.- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.- Additively Homomorphic UC Commitments with Optimal Amortized Overhead.- Interactive Message-Locked Encryption and Secure Deduplication.- Faster ECC over F2521_1.- Cryptography with Imperfect Keys.- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.- A Tamper and Leakage Resilient von Neumann Architecture.- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.- Interactive Proofs.- Adaptive Proofs of Knowledge in the Random Oracle Model.- Making Sigma-Protocols Non-interactive Without Random Oracles.- Lattice-Based Cryptography.- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.- Packing Messages and Optimizing Bootstrapping in GSW-FHE.- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products.- Predicate Encryption for Multi-Dimensional Range Queries from Lattices.- On the Practical Security of Inner Product Functional Encryption.- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting., This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.
LC Classification Number
QA268
Item description from the seller
Popular categories from this store
Seller feedback (779)
- g***r (156)- Feedback left by buyer.Past monthVerified purchaseItem was shipped out quickly, well packaged and just as described. Smooth transaction, great seller. Thanks!!
- y***r (1214)- Feedback left by buyer.Past 6 monthsVerified purchaseWonderful! Items new as described, safely packaged, quickly shipped, and a great value. Thank you!
- n***g (48)- Feedback left by buyer.Past 6 monthsVerified purchaseBeautiful and fragile product arrived quickly, carefully packaged, and exactly as described. Great quality and condition, solid value. Thank you!
More to explore :
- Revision/Practice 1950-1999 Publication Year Study Workbooks Prep,
- Revision/Practice 2010-Now Publication Year Study Hardcovers Prep,
- Revision/Practice 2010-Now Publication Year Study Paperbacks Prep,
- Coordination Group Publications Revision/Practice Study Guides & Test Prep,
- Revision/Practice 1700-1799 Publication Year Study Guides & Test Prep,
- Revision/Practice 1950-1999 Publication Year Study Guides & Test Prep in English,
- Revision/Practice 2010-Now Publication Year Study Guides & Test Prep in Spanish,
- Phonics Practice Readers,
- 2010-Now Publication Year International Edition Textbooks,
- Revision/Practice Study Paperbacks Prep in Spanish