Ebook: Advances in Cryptology – EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
- Genre: Computers // Cryptography
- Tags: Data Encryption, Computer Communication Networks, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Management of Computing and Information Systems
- Series: Lecture Notes in Computer Science 4965 : Security and Cryptology
- Year: 2008
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008, held in Istanbul, Turkey, in April 2008.
The 31 revised full papers presented were carefully reviewed and selected from 163 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on cryptanalysis, signatures, encryption, curve based cryptography, hash and mac function constructions, cryptanalysis of hash and mac functions, multi-party computation, protocols, zero knowledge, foundations, and UC multi-party computation using tamper proof hardware.
This book constitutes the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008, held in Istanbul, Turkey, in April 2008.
The 31 revised full papers presented were carefully reviewed and selected from 163 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on cryptanalysis, signatures, encryption, curve based cryptography, hash and mac function constructions, cryptanalysis of hash and mac functions, multi-party computation, protocols, zero knowledge, foundations, and UC multi-party computation using tamper proof hardware.