Theory of Cryptography | Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings

Ran Canetti

ISBN 10: 354078523X ISBN 13: 9783540785231
Editore: Springer, 2008
Nuovi Taschenbuch

Da preigu, Osnabrück, Germania Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Venditore AbeBooks dal 5 agosto 2024

Questo articolo specifico non è più disponibile.

Riguardo questo articolo

Descrizione:

Theory of Cryptography | Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings | Ran Canetti | Taschenbuch | xii | Englisch | 2008 | Springer | EAN 9783540785231 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu. Codice articolo 101849494

Segnala questo articolo

Riassunto:

This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.

Contenuti: Technical Session 1.- Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency.- On Seed-Incompressible Functions.- Technical Session 2.- Asymptotically Efficient Lattice-Based Digital Signatures.- Basing Weak Public-Key Cryptography on Strong One-Way Functions.- Technical Session 3.- Which Languages Have 4-Round Zero-Knowledge Proofs?.- How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge.- General Properties of Quantum Zero-Knowledge Proofs.- Technical Session 4.- The Layered Games Framework for Specifications and Analysis of Security Protocols.- Universally Composable Multi-party Computation with an Unreliable Common Reference String.- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.- Fast Private Norm Estimation and Heavy Hitters.- Technical Session 5.- Matroids Can Be Far from Ideal Secret Sharing.- Perfectly-Secure MPC with Linear Communication Complexity.- MPC vs. SFE: Perfect Security in a Unified Corruption Model.- Invited Talk.- Bridging Game Theory and Cryptography: Recent Results and Future Directions.- Technical Session 6.- Verifiably Secure Devices.- Lower Bounds on Implementing Robust and Resilient Mediators.- Cryptography and Game Theory: Designing Protocols for Exchanging Information.- Technical Session 7.- Equivocal Blind Signatures and Adaptive UC-Security.- P-signatures and Noninteractive Anonymous Credentials.- Technical Session 8.- Multi-property Preserving Combiners for Hash Functions.- OT-Combiners via Secure Computation.- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way.- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.- Technical Session 9.- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.- Randomness Extraction Via ?-Biased Masking in the Presence of a Quantum Attacker.- Technical Session 10.- An Equivalence Between Zero Knowledge and Commitments.- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model.- Technical Session 11.- The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.- On Constant-Round Concurrent Zero-Knowledge.- Technical Session 12.- Concurrent Non-malleable Commitments from Any One-Way Function.- Faster and Shorter Password-Authenticated Key Exchange.- Technical Session 13.- Saving Private Randomness in One-Way Functions and Pseudorandom Generators.- Degradation and Amplification of Computational Hardness.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Dati bibliografici

Titolo: Theory of Cryptography | Fifth Theory of ...
Casa editrice: Springer
Data di pubblicazione: 2008
Legatura: Taschenbuch
Condizione: Neu

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

Canetti, Ran [Editor]
Editore: Springer, 2008
ISBN 10: 354078523X ISBN 13: 9783540785231
Antico o usato Paperback

Da: GuthrieBooks, Spring Branch, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Except for library markings, interior clean and unmarked. Tight binding. Codice articolo UTD14a17894

Contatta il venditore

Compra usato

EUR 38,44
Spedizione EUR 5,99
Spedito in U.S.A.

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Unbekannt
Editore: Springer, 2008
ISBN 10: 354078523X ISBN 13: 9783540785231
Antico o usato Brossura

Da: Buchpark, Trebbin, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Gut. Zustand: Gut | Seiten: 664 | Sprache: Englisch | Produktart: Bücher | TCC 2008, the 5th Theory of Cryptography Conference, was held in New York, New York, March 19¿21, 2008, at New York University. TCC 2008 was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR)andwas organizedincooperationwiththeDepartmentofComputerScienceatNewYork University and the Courant Institute for Mathematical Sciences. The General Chairs of the conference were Yevgeniy Dodis and Victor Shoup. The conference received 81 submissions, of which the Program Committee selected34forpresentationattheconference.Theauthorsoftwopapersthen- cidedto mergetheir papers,resulting in a totalof33 presentedpapers.The Best Student Paper Award was given to Paul Valiant for his paper ¿Incrementally Veri?able Computation or Knowledge Implies Time/Space E?ciency.¿ These proceedings consist of revised versions of the presented papers. The revisions were not reviewed. The authors bear full responsibility for the contents of their papers. The conference programalso included four special events: an invited talk - titled ¿Randomness Extractors and Their Cryptographic Applications¿ by Salil Vadhan; a tutorial entitled ¿Bridging Cryptography and Game Theory: Recent Results and Future Directions,¿ given by Jonathan Katz (with an accom- nying tutorial in the proceedings); a panel discussion on ¿Game Theory and Cryptography: Towards a Joint Point of View?¿ with Tal Rabin as moderator and Jonathan Katz, Silvio Micali, and Moni Naor as panelists; and a Rump Session chaired by Anna Lysyanskaya. Codice articolo 4294729/3

Contatta il venditore

Compra usato

EUR 82,57
Spedizione EUR 105,00
Spedito da Germania a U.S.A.

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Canetti, Ran
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Brossura
Print on Demand

Da: moluna, Greven, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Technical Session 1.- Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency.- On Seed-Incompressible Functions.- Technical Session 2.- Asymptotically Efficient Lattice-Based Digital Signatures.- Basing Weak Public-Key Crypt. Codice articolo 4900961

Contatta il venditore

Compra nuovo

EUR 92,27
Spedizione EUR 48,99
Spedito da Germania a U.S.A.

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Ran Canetti
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Taschenbuch

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - TCC 2008, the 5th Theory of Cryptography Conference, was held in New York, New York, March 19 21, 2008, at New York University. TCC 2008 was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR)andwas organizedincooperationwiththeDepartmentofComputerScienceatNewYork University and the Courant Institute for Mathematical Sciences. The General Chairs of the conference were Yevgeniy Dodis and Victor Shoup. The conference received 81 submissions, of which the Program Committee selected34forpresentationattheconference.Theauthorsoftwopapersthen- cidedto mergetheir papers,resulting in a totalof33 presentedpapers.The Best Student Paper Award was given to Paul Valiant for his paper Incrementally Veri able Computation or Knowledge Implies Time/Space E ciency. These proceedings consist of revised versions of the presented papers. The revisions were not reviewed. The authors bear full responsibility for the contents of their papers. The conference programalso included four special events: an invited talk - titled Randomness Extractors and Their Cryptographic Applications by Salil Vadhan; a tutorial entitled Bridging Cryptography and Game Theory: Recent Results and Future Directions, given by Jonathan Katz (with an accom- nying tutorial in the proceedings); a panel discussion on Game Theory and Cryptography: Towards a Joint Point of View with Tal Rabin as moderator and Jonathan Katz, Silvio Micali, and Moni Naor as panelists; and a Rump Session chaired by Anna Lysyanskaya. Codice articolo 9783540785231

Contatta il venditore

Compra nuovo

EUR 106,99
Spedizione EUR 64,95
Spedito da Germania a U.S.A.

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Ran Canetti
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Taschenbuch
Print on Demand

Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -TCC 2008, the 5th Theory of Cryptography Conference, was held in New York, New York, March 19 21, 2008, at New York University. TCC 2008 was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR)andwas organizedincooperationwiththeDepartmentofComputerScienceatNewYork University and the Courant Institute for Mathematical Sciences. The General Chairs of the conference were Yevgeniy Dodis and Victor Shoup. The conference received 81 submissions, of which the Program Committee selected34forpresentationattheconference.Theauthorsoftwopapersthen- cidedto mergetheir papers,resulting in a totalof33 presentedpapers.The Best Student Paper Award was given to Paul Valiant for his paper Incrementally Veri able Computation or Knowledge Implies Time/Space E ciency. These proceedings consist of revised versions of the presented papers. The revisions were not reviewed. The authors bear full responsibility for the contents of their papers. The conference programalso included four special events: an invited talk - titled Randomness Extractors and Their Cryptographic Applications by Salil Vadhan; a tutorial entitled Bridging Cryptography and Game Theory: Recent Results and Future Directions, given by Jonathan Katz (with an accom- nying tutorial in the proceedings); a panel discussion on Game Theory and Cryptography: Towards a Joint Point of View with Tal Rabin as moderator and Jonathan Katz, Silvio Micali, and Moni Naor as panelists; and a Rump Session chaired by Anna Lysyanskaya. 664 pp. Englisch. Codice articolo 9783540785231

Contatta il venditore

Compra nuovo

EUR 106,99
Spedizione EUR 23,00
Spedito da Germania a U.S.A.

Quantità: 2 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Ran Canetti
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Taschenbuch
Print on Demand

Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Technical Session 1.- Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency.- On Seed-Incompressible Functions.- Technical Session 2.- Asymptotically Efficient Lattice-Based Digital Signatures.- Basing Weak Public-Key Cryptography on Strong One-Way Functions.- Technical Session 3.- Which Languages Have 4-Round Zero-Knowledge Proofs .- How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge.- General Properties of Quantum Zero-Knowledge Proofs.- Technical Session 4.- The Layered Games Framework for Specifications and Analysis of Security Protocols.- Universally Composable Multi-party Computation with an Unreliable Common Reference String.- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.- Fast Private Norm Estimation and Heavy Hitters.- Technical Session 5.- Matroids Can Be Far from Ideal Secret Sharing.- Perfectly-Secure MPC with Linear Communication Complexity.- MPC vs. SFE: Perfect Security in a Unified Corruption Model.- Invited Talk.- Bridging Game Theory and Cryptography: Recent Results and Future Directions.- Technical Session 6.- Verifiably Secure Devices.- Lower Bounds on Implementing Robust and Resilient Mediators.- Cryptography and Game Theory: Designing Protocols for Exchanging Information.- Technical Session 7.- Equivocal Blind Signatures and Adaptive UC-Security.- P-signatures and Noninteractive Anonymous Credentials.- Technical Session 8.- Multi-property Preserving Combiners for Hash Functions.- OT-Combiners via Secure Computation.- Semi-honest to Malicious Oblivious Transfer-The Black-Box Way.- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.- Technical Session 9.-A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.- Randomness Extraction Via -Biased Masking in the Presence of a QuantumAttacker.- Technical Session 10.- An Equivalence Between Zero Knowledge and Commitments.- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model.- Technical Session 11.- The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.- On Constant-Round Concurrent Zero-Knowledge.- Technical Session 12.- Concurrent Non-malleable Commitments from Any One-Way Function.- Faster and Shorter Password-Authenticated Key Exchange.- Technical Session 13.- Saving Private Randomness in One-Way Functions and Pseudorandom Generators.- Degradation and Amplification of Computational Hardness.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 664 pp. Englisch. Codice articolo 9783540785231

Contatta il venditore

Compra nuovo

EUR 106,99
Spedizione EUR 60,00
Spedito da Germania a U.S.A.

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Editore: Springer, 2008
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Brossura

Da: Ria Christie Collections, Uxbridge, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. In. Codice articolo ria9783540785231_new

Contatta il venditore

Compra nuovo

EUR 113,71
Spedizione EUR 13,76
Spedito da Regno Unito a U.S.A.

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Editore: Springer, 2008
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Brossura

Da: Books Puddle, New York, NY, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. pp. 664. Codice articolo 26285368

Contatta il venditore

Compra nuovo

EUR 151,69
Spedizione EUR 3,42
Spedito in U.S.A.

Quantità: 4 disponibili

Aggiungi al carrello

Foto dell'editore

Editore: Springer, 2008
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Brossura
Print on Demand

Da: Majestic Books, Hounslow, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Print on Demand pp. 664 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Codice articolo 7595367

Contatta il venditore

Compra nuovo

EUR 153,91
Spedizione EUR 7,46
Spedito da Regno Unito a U.S.A.

Quantità: 4 disponibili

Aggiungi al carrello

Foto dell'editore

Canetti, Ran (Editor)
ISBN 10: 354078523X ISBN 13: 9783540785231
Nuovo Paperback

Da: Revaluation Books, Exeter, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Brand New. 1st edition. 643 pages. 9.00x6.25x1.00 inches. In Stock. Codice articolo x-354078523X

Contatta il venditore

Compra nuovo

EUR 155,64
Spedizione EUR 14,35
Spedito da Regno Unito a U.S.A.

Quantità: 2 disponibili

Aggiungi al carrello

Vedi altre 2 copie di questo libro

Vedi tutti i risultati per questo libro