Normal view MARC view ISBD view

Theory of Cryptography [electronic resource] : 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / edited by Ronald Cramer.

Contributor(s): Cramer, Ronald [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 7194Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: 672 p. 6 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642289149.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks  | Data protection | Coding theory | Information theory | Computer science -- Mathematics | Algorithms | Cryptology | Computer Communication Networks | Data and Information Security | Coding and Information Theory | Mathematical Applications in Computer Science | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

There are no comments for this item.

Log in to your account to post a comment.