Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II
From MaRDI portal
Publication:2399087
DOI10.1007/978-3-319-63715-0zbMath1369.94004OpenAlexW2528526964MaRDI QIDQ2399087
No author found.
Publication date: 21 August 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (7)
Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More ⋮ On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate ⋮ Towards tight security of cascaded LRW2 ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ The Relation Between CENC and NEMO ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ Weak Zero-Knowledge beyond the Black-Box Barrier
This page was built for publication: Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II