<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>04012nam a22006375i 4500</leader>
  <controlfield tag="001">978-3-662-53887-6</controlfield>
  <controlfield tag="003">DE-He213</controlfield>
  <controlfield tag="005">20210624151046.0</controlfield>
  <controlfield tag="007">cr nn 008mamaa</controlfield>
  <controlfield tag="008">161108s2016    gw |    s    |||| 0|eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9783662538876</subfield>
   <subfield code="9">978-3-662-53887-6</subfield>
  </datafield>
  <datafield tag="024" ind1="7" ind2=" ">
   <subfield code="a">10.1007/978-3-662-53887-6</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2="4">
   <subfield code="a">QA76.9.D335</subfield>
  </datafield>
  <datafield tag="072" ind1=" " ind2="7">
   <subfield code="a">GPJ</subfield>
   <subfield code="2">bicssc</subfield>
  </datafield>
  <datafield tag="072" ind1=" " ind2="7">
   <subfield code="a">COM053000</subfield>
   <subfield code="2">bisacsh</subfield>
  </datafield>
  <datafield tag="072" ind1=" " ind2="7">
   <subfield code="a">GPJ</subfield>
   <subfield code="2">thema</subfield>
  </datafield>
  <datafield tag="072" ind1=" " ind2="7">
   <subfield code="a">URY</subfield>
   <subfield code="2">thema</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
   <subfield code="a">005.82</subfield>
   <subfield code="2">23</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Advances in Cryptology – ASIACRYPT 2016</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /</subfield>
   <subfield code="c">edited by Jung Hee Cheon, Tsuyoshi Takagi.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">1st ed. 2016.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Berlin, Heidelberg :</subfield>
   <subfield code="b">Springer Berlin Heidelberg :</subfield>
   <subfield code="b">Imprint: Springer,</subfield>
   <subfield code="c">2016.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">XXIV, 941 p. 217 illus.</subfield>
   <subfield code="b">online resource.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="b">c</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="b">cr</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="347" ind1=" " ind2=" ">
   <subfield code="a">text file</subfield>
   <subfield code="b">PDF</subfield>
   <subfield code="2">rda</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
   <subfield code="a">Security and Cryptology ;</subfield>
   <subfield code="v">10031</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Data encryption (Computer science).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Coding theory.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Information theory.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Management information systems.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer science.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computers.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer science—Mathematics.</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="4">
   <subfield code="a">Cryptology.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28020</subfield>
  </datafield>
  <datafield tag="650" ind1="2" ind2="4">
   <subfield code="a">Systems and Data Security.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28060</subfield>
  </datafield>
  <datafield tag="650" ind1="2" ind2="4">
   <subfield code="a">Coding and Information Theory.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I15041</subfield>
  </datafield>
  <datafield tag="650" ind1="2" ind2="4">
   <subfield code="a">Management of Computing and Information Systems.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I24067</subfield>
  </datafield>
  <datafield tag="650" ind1="2" ind2="4">
   <subfield code="a">Theory of Computation.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I16005</subfield>
  </datafield>
  <datafield tag="650" ind1="2" ind2="4">
   <subfield code="a">Mathematics of Computing.</subfield>
   <subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I17001</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Cheon, Jung Hee.</subfield>
   <subfield code="e">editor.</subfield>
   <subfield code="0">(orcid)0000-0002-7085-2220</subfield>
   <subfield code="1">https://orcid.org/0000-0002-7085-2220</subfield>
   <subfield code="4">edt</subfield>
   <subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Takagi, Tsuyoshi.</subfield>
   <subfield code="e">editor.</subfield>
   <subfield code="4">edt</subfield>
   <subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">SpringerLink (Online service)</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">Springer Nature eBook</subfield>
  </datafield>
  <datafield tag="776" ind1="0" ind2="8">
   <subfield code="i">Printed edition:</subfield>
   <subfield code="z">9783662538869</subfield>
  </datafield>
  <datafield tag="776" ind1="0" ind2="8">
   <subfield code="i">Printed edition:</subfield>
   <subfield code="z">9783662538883</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
   <subfield code="a">Security and Cryptology ;</subfield>
   <subfield code="v">10031</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://doi.org/10.1007/978-3-662-53887-6</subfield>
  </datafield>
  <datafield tag="912" ind1=" " ind2=" ">
   <subfield code="a">ZDB-2-SCS</subfield>
  </datafield>
  <datafield tag="912" ind1=" " ind2=" ">
   <subfield code="a">ZDB-2-SXCS</subfield>
  </datafield>
  <datafield tag="912" ind1=" " ind2=" ">
   <subfield code="a">ZDB-2-LNC</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="a">Computer Science (SpringerNature-11645)</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="a">Computer Science (R0) (SpringerNature-43710)</subfield>
  </datafield>
 </record>
</collection>
