Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Theory of CryptographyTheory of Cryptography

Theory of Cryptography

Yuval Ishai

About this book

This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.

Details

OL Work ID
OL16975773W

Subjects

Coding theoryData encryption (Computer science)Computer networksComputer softwareData protectionComputer scienceCryptographyComputer securityAlgorithm Analysis and Problem ComplexityMath Applications in Computer ScienceCoding and Information TheorySystems and Data SecurityComputer Communication NetworksData Encryption

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.