• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • An Introduction to Silent Secure Computation

    An Introduction to Silent Secure Computation by Couteau, Geoffroy;

    Series: SpringerBriefs in Information Security and Cryptography;

      • GET 12% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 53.49
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        22 184 Ft (21 128 Ft + 5% VAT)
      • Discount 12% (cc. 2 662 Ft off)
      • Discounted price 19 522 Ft (18 593 Ft + 5% VAT)

    22 184 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher Springer Nature Switzerland
    • Date of Publication 20 March 2026

    • ISBN 9783032070883
    • Binding Paperback
    • No. of pages140 pages
    • Size 235x155 mm
    • Language English
    • Illustrations XII, 140 p. 11 illus., 6 illus. in color.
    • 700

    Categories

    Long description:

    Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on their combined inputs without compromising their privacy. Secure computation offers a theoretical solution to a vast array of problems where one wishes to simultaneously maintain a fine-grained control over the users’ privacy and have flexibility in how their data is used in a protocol. Over the past decade, secure computation has largely emerged from the depth of theoretical research to enter the realm of practically-usable technologies, and secure protocols are now routinely implemented and deployed. This is the result of a widespread and ongoing research effort from the cryptography community, which has produced a diverse ecosystem of protocols and paradigms optimized for a variety of concrete applications. This book covers one such recent paradigm, the area of silent secure computation, which strikes a careful balance between communication and computation overheads. This paradigm has recently emerged as a promising path towards fast secure computation in bandwidth-restricted settings, and has had a significant influence on the landscape of practical secure computation. The goal of the book is to provide an accessible introduction to silent secure computation. It is aimed at Ph.D. students and researchers in cryptography and has a strong focus on explaining the intuitions and giving the reader a sense of scale, in the hope of conveying insights about the practicality of silent secure computation in various contexts and to give a clear overview of some of the core challenges in the field.

    More

    Table of Contents:

    1. Introduction.- 2. Secure Computation: a Primer.- 3. Silent Secure Computation.- 4. Advanced Topics in Silent Secure Computation.- 5. Bibliography.

    More
    0