Topics in Cryptology - CT-RSA 2019 -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre72,10 €
Produit Neuf
Ou 18,03 € /mois
- Livraison à 0,01 €
- Livré entre le 26 mai et le 3 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783030126117_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Topics In Cryptology - Ct - Rsa 2019 Format Broché - Livre Littérature Générale
0 avis sur Topics In Cryptology - Ct - Rsa 2019 Format Broché - Livre Littérature Générale
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Portfolio Joubert "Les Scouts"
Occasion dès 75,00 €
-
Ocp Oracle Certified Professional Java Se 21 Developer Study Guide
Neuf dès 72,73 €
-
The Lines Of My Hand
1 avis
Occasion dès 79,00 €
-
Western Technology And Soviet Economic Development 1945-1968
Neuf dès 60,23 €
-
Toute Photographie Fait Énigme
Occasion dès 45,80 €
-
Kodak Pixpro Fz55 :
Neuf dès 48,99 €
-
Married Women Who Love Women
Neuf dès 43,60 €
-
Handbook Of Multilingualism And Multiculturalism
Neuf dès 60,00 €
Occasion dès 50,00 €
-
Under Siege
Neuf dès 40,31 €
-
Bruegel. The Complete Works
Neuf dès 95,23 €
-
Moonwalk By Michael Jackson
2 avis
Occasion dès 70,46 €
-
Gottfried Wilhelm Leibniz: De Conditionibus (Bibliotheque Des Textes Philosophiques)
Neuf dès 37,00 €
-
The Young Adventurer's Collection Box Set 2 (Dungeons & Dragons 4-Book Boxed Set)
Neuf dès 37,27 €
-
Best Karate, Vol.3
Occasion dès 39,00 €
-
Joel Meyerowitz: Europa 1966-1967
Neuf dès 50,00 €
-
Quantum Computing: An Applied Approach
Occasion dès 39,00 €
-
Allemand - La Méthode Michel Thomas, Débutants Et Faux Débutants (7 Cd Audio)
1 avis
Neuf dès 75,00 €
Occasion dès 50,39 €
-
Ernst Haas - New York In Color, 1952-1962
1 avis
Neuf dès 49,54 €
-
Implementing Domain-Driven Design
Neuf dès 63,38 €
-
Mies Van Der Rohe
Occasion dès 96,00 €
Produits similaires
Présentation Topics In Cryptology - Ct - Rsa 2019 Format Broché
- Livre Littérature Générale
Résumé :
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.
Sommaire: Structure-Preserving Certificateless Encryption and its Application.- Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks.- Downgradable Identity-based Encryption and Applications.- Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle).- An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.- New techniques for multi-value input homomorphic evaluation and applications.- Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality.- Robust Encryption, Extended.- Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.- Doubly half-injective PRGs for incompressible white-box cryptography.- Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-Party Computation.- Lossy Trapdoor Permutations with Improved Lossiness.- Post-Quantum EPID Signatures from Symmetric Primitives.- Assessment of the key reuse resilience of NewHope.- Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.- Linking Stam's Bounds With Generalized Truncation.- Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling.- Efficient Fully-Leakage Resilient One-More Signature Schemes.- MILP-based Differential Attack on Round-reduced GIFT.- Quantum Chosen-Ciphertext Attacks against Feistel Ciphers.- Automatic Search for A Variant of Division Property Using Three Subsets.- Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations.- Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks.- EPIC: Efficient Private Image Classification (or: Learning from the Masters).- Context Hiding Multi-Key Linearly Homomorphic Authenticators.- Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation.- Delegatable Anonymous Credentials from Mercurial Signatures.- Accountable Tracing Signatures from Lattices.
Détails de conformité du produit
Personne responsable dans l'UE