Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9215)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CRYPTO 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (37 papers)
-
Cryptanalytic Insights
-
Modes and Constructions
-
Multilinear Maps and IO
Other volumes
-
Advances in Cryptology -- CRYPTO 2015
-
Advances in Cryptology -- CRYPTO 2015
Keywords
- Adaptive security
- Asymmetric cryptography
- Biometric authentication
- Cascade encryption
- Deterministic encryption
- Formal methods
- Functional encryption
- Information theory
- Multi-party computation
- Privacy
- Public key cryptography
- Secure computation
- Stream ciphers
- Symmetric cryptography
- Zero knowledge
- algorithm analysis and problem complexity
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology -- CRYPTO 2015
Book Subtitle: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
Editors: Rosario Gennaro, Matthew Robshaw
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-47989-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2015
Softcover ISBN: 978-3-662-47988-9Published: 11 August 2015
eBook ISBN: 978-3-662-47989-6Published: 31 July 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 787
Number of Illustrations: 108 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science