Public-Key Cryptography PKC 2015:18th IACR International Conference On Practice

US $99.32
Condition:
Very Good
Shipping:
Free Standard Shipping.
Located in: Springfield, Missouri, United States
Delivery:
Estimated between Wed, Apr 16 and Mon, Apr 21 to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
Seller does not accept returns.
Payments:
       Diners Club
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:185350527935
Last updated on Jan 10, 2024 15:25:09 PSTView all revisionsView all revisions

Item specifics

Condition
Very Good: A book that does not look new and has been read but is in excellent condition. No obvious ...
Book Title
Public-key Cryptography Pkc 2015 : 18th Iacr International Confer
ISBN
9783662464465
Subject Area
Computers, Language Arts & Disciplines
Publication Name
Public-Key Cryptography -- PKC 2015 : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
Publisher
Springer Berlin / Heidelberg
Item Length
9.3 in
Subject
Communication Studies, Information Theory, Security / Cryptography, Security / General
Publication Year
2015
Series
Lecture Notes in Computer Science Ser.
Type
Textbook
Format
Trade Paperback
Language
English
Author
Jonathan Katz
Item Weight
439.3 Oz
Item Width
6.1 in
Number of Pages
Xiv, 824 Pages

About this product

Product Identifiers

Publisher
Springer Berlin / Heidelberg
ISBN-10
3662464462
ISBN-13
9783662464465
eBay Product ID (ePID)
208648915

Product Key Features

Number of Pages
Xiv, 824 Pages
Language
English
Publication Name
Public-Key Cryptography -- PKC 2015 : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
Publication Year
2015
Subject
Communication Studies, Information Theory, Security / Cryptography, Security / General
Type
Textbook
Author
Jonathan Katz
Subject Area
Computers, Language Arts & Disciplines
Series
Lecture Notes in Computer Science Ser.
Format
Trade Paperback

Dimensions

Item Weight
439.3 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2015-933270
Dewey Edition
23
Series Volume Number
9020
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
Public-Key Encryption.- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.- On the Selective Opening Security of Practical Public-Key Encryption Schemes.- How Secure is Deterministic Encryption'.- E-Cash.- Divisible E-Cash Made Practical.- Anonymous Transferable E-Cash.- Cryptanalysis.- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.- A Polynomial-Time Attack on the BBCRS Scheme.- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case.- Digital Signatures.- Digital Signatures from Strong RSA without Prime Generation.- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.- Tightly-Secure Signatures from Chameleon Hash Functions.- Password-Based Authentication.- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.- Pairing-Based Cryptography.- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.- Digital Signatures.- Simpler Efficient Group Signatures from Lattices.- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.- Efficient Constructions.- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.- Additively Homomorphic UC Commitments with Optimal Amortized Overhead.- Interactive Message-Locked Encryption and Secure Deduplication.- Faster ECC over F2521_1.- Cryptography with Imperfect Keys.- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.- A Tamper and Leakage Resilient von Neumann Architecture.- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.- Interactive Proofs.- Adaptive Proofs of Knowledge in the Random Oracle Model.- Making Sigma-Protocols Non-interactive Without Random Oracles.- Lattice-Based Cryptography.- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.- Packing Messages and Optimizing Bootstrapping in GSW-FHE.- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products.- Predicate Encryption for Multi-Dimensional Range Queries from Lattices.- On the Practical Security of Inner Product Functional Encryption.- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Synopsis
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption., Public-Key Encryption.- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.- On the Selective Opening Security of Practical Public-Key Encryption Schemes.- How Secure is Deterministic Encryption?.- E-Cash.- Divisible E-Cash Made Practical.- Anonymous Transferable E-Cash.- Cryptanalysis.- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.- A Polynomial-Time Attack on the BBCRS Scheme.- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case.- Digital Signatures.- Digital Signatures from Strong RSA without Prime Generation.- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.- Tightly-Secure Signatures from Chameleon Hash Functions.- Password-Based Authentication.- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.- Pairing-Based Cryptography.- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.- Digital Signatures.- Simpler Efficient Group Signatures from Lattices.- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.- Efficient Constructions.- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.- Additively Homomorphic UC Commitments with Optimal Amortized Overhead.- Interactive Message-Locked Encryption and Secure Deduplication.- Faster ECC over F2521_1.- Cryptography with Imperfect Keys.- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.- A Tamper and Leakage Resilient von Neumann Architecture.- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.- Interactive Proofs.- Adaptive Proofs of Knowledge in the Random Oracle Model.- Making Sigma-Protocols Non-interactive Without Random Oracles.- Lattice-Based Cryptography.- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.- Packing Messages and Optimizing Bootstrapping in GSW-FHE.- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products.- Predicate Encryption for Multi-Dimensional Range Queries from Lattices.- On the Practical Security of Inner Product Functional Encryption.- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting., This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.
LC Classification Number
QA268

Item description from the seller

About this seller

1bestbargainsdaily

99.6% positive feedback3.4K items sold

Joined Jul 2001
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
5.0

Popular categories from this store

Seller feedback (779)

All ratings
Positive
Neutral
Negative
|Listed in category: