000 | 03351nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-03329-3 | ||
003 | DE-He213 | ||
005 | 20240730165907.0 | ||
007 | cr nn 008mamaa | ||
008 | 181026s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030033293 _9978-3-030-03329-3 |
||
024 | 7 |
_a10.1007/978-3-030-03329-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - ASIACRYPT 2018 _h[electronic resource] : _b24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II / _cedited by Thomas Peyrin, Steven Galbraith. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXVII, 767 p. 183 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11273 |
|
505 | 0 | _aSymmetric-Key Cryptanalysis -- Public Key and Identity-Based Encryption -- Side-Channels -- Signatures -- Leakage-Resilient Cryptography -- Functional/Inner Product/Predicate Encrpytion. | |
520 | _aThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer Communication Networks. _991062 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aPeyrin, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991063 |
|
700 | 1 |
_aGalbraith, Steven. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991064 |
|
710 | 2 |
_aSpringerLink (Online service) _991065 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030033286 |
776 | 0 | 8 |
_iPrinted edition: _z9783030033309 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11273 _991066 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-03329-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86603 _d86603 |