Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3876)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: TCC 2006.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Keywords
Table of contents (32 papers)
-
The Bounded-Retrieval Model
-
Universally-Composible Security
Other volumes
-
Theory of Cryptography
Editors and Affiliations
Bibliographic Information
Book Title: Theory of Cryptography
Book Subtitle: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
Editors: Shai Halevi, Tal Rabin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/11681878
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2006
Softcover ISBN: 978-3-540-32731-8Published: 27 February 2006
eBook ISBN: 978-3-540-32732-5Published: 01 March 2006
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 622
Topics: Cryptology, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Operating Systems, Management of Computing and Information Systems, Computers and Society