Description |
1 online resource (xiv, 744 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6223 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6223. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Summary |
Annotation This book constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in Santa Barbara, CA, USA in August 2010, co-located with CHES 2010, the workshop on Cryptographic Hardware and Embedded Systems. The 39 revised full papers presented were carefully reviewed and selected from 203 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on leakage, lattice, homomorphic encryption, theory and applications, key exchange, OAEP/RSA, CCA, attacks, composition, computation delegation and obfuscation, multiparty computation, pseudorandomness, and quantum |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Computers -- Access control -- Congresses.
|
|
Cryptography -- Congresses.
|
|
Computer Security.
|
|
Computing Methodologies.
|
Genre/Form |
Conference papers and proceedings.
|
|
Congress.
|
|
Conference papers and proceedings.
|
Form |
Electronic book
|
Author |
Rabin, Tal.
|
ISBN |
9783642146237 |
|
3642146236 |
|