Advances in cryptology-- CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 : proceedings /

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of...

Full description

Corporate Authors: CRYPTO (Conference) Santa Barbara, Calif.)
Other Authors: CRYPTO (Conference), Rogaway, Phillip., SpringerLink (Online service)
Format: eBook
Language: English
Published: Heidelberg ; New York : Springer, ©2011.
Heidelberg ; New York : [2011]
Physical Description: 1 online resource (xv, 782 pages).
Series: Lecture notes in computer science ; 6841.
LNCS sublibrary. Security and cryptology.
Subjects:
Summary: This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
Item Description: Includes bibliographical references and author index.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
Physical Description: 1 online resource (xv, 782 pages).
Bibliography: Includes bibliographical references and author index.
ISBN: 9783642227929
3642227929
ISSN: 0302-9743 ;