
off
Advances in Cryptology - EUROCRYPT 2012 : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings
Free delivery worldwide
Available. Expected delivery to the United States in 8-11 business days.
Not ordering to the United States? Click here.
Description
The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
show more
Product details
- Paperback | 758 pages
- 155 x 235 x 43.18mm | 1,169g
- 02 Apr 2012
- Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
- Springer-Verlag Berlin and Heidelberg GmbH & Co. K
- Berlin, Germany
- English
- 2012 ed.
- XIV, 758 p.
- 3642290108
- 9783642290107
- 2,740,078
Other books in this series
Deductive Software Verification - The KeY Book
21 Dec 2016
Paperback
US$129.54 US$139.99
Save US$10.45
Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Posture, Motion and Health
07 Jun 2020
Paperback
US$103.85 US$109.99
Save US$6.14
Least Squares Orthogonal Distance Fitting of Curves and Surfaces in Space
01 Jan 2005
Paperback
US$79.75 US$84.99
Save US$5.24
Intelligence in Services and Networks: Technology for Cooperative Competition
01 Sep 1997
Paperback
US$88.17 US$109.99
Save US$21.82
Artificial Intelligence: Methodology, Systems, and Applications
29 Aug 2018
Paperback
US$68.90 US$69.99
Save US$1.09
Back cover copy
The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.
show more