|
|
|
|
LEADER |
03577nam a22005895i 4500 |
001 |
978-3-642-40041-4 |
003 |
DE-He213 |
005 |
20210624221550.0 |
007 |
cr nn 008mamaa |
008 |
130814s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642400414
|9 978-3-642-40041-4
|
024 |
7 |
|
|a 10.1007/978-3-642-40041-4
|2 doi
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Advances in Cryptology – CRYPTO 2013
|h [electronic resource] :
|b 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I /
|c edited by Ran Canetti, Juan A. Garay.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XVIII, 590 p. 83 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8042
|
505 |
0 |
|
|a Lattices and FHE -- Foundations of Hardness -- Cryptanalysis -- New Directions -- Leakage Resilience -- Symmetric Encryption and PRFs -- Key Exchange -- Multi Linear Maps -- Ideal Ciphers.
|
520 |
|
|
|a The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science—Mathematics.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I16021
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I17028
|
650 |
2 |
4 |
|a Computer Science, general.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I00001
|
700 |
1 |
|
|a Canetti, Ran.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Garay, Juan A.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642400421
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642400407
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8042
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-40041-4
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|