Pairing-Based Cryptography - Pairing 2012 [electronic resource] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / edited by Michel Abdalla, Tanja Lange.
Contributor(s): Abdalla, Michel [editor.] | Lange, Tanja [editor.] | SpringerLink (Online service).
Material type: BookSeries: Lecture Notes in Computer Science: 7708Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013Description: XVI, 333 p. 18 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642363344.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Coding theory | Algorithms | Computer Science | Data Encryption | Systems and Data Security | Coding and Information Theory | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applictions.This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applictions.
There are no comments for this item.