000 03443nam a22006615i 4500
001 978-3-030-05378-9
003 DE-He213
005 20240730170252.0
007 cr nn 008mamaa
008 181205s2018 sz | s |||| 0|eng d
020 _a9783030053789
_9978-3-030-05378-9
024 7 _a10.1007/978-3-030-05378-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aProgress in Cryptology - INDOCRYPT 2018
_h[electronic resource] :
_b19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings /
_cedited by Debrup Chakraborty, Tetsu Iwata.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXXI, 399 p. 54 illus., 13 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11356
505 0 _aOutsourced Computation and Searchable Encryption -- Symmetric Key Cryptography and Format Preserving Encryption -- Fault Attacks and Hash Functions -- Post Quantum Cryptography -- Asymmetric Key Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols.
520 _aThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aData mining.
_93907
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aSoftware engineering.
_94138
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Services.
_978910
650 2 4 _aData Mining and Knowledge Discovery.
_992631
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aSoftware Engineering.
_94138
700 1 _aChakraborty, Debrup.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_992632
700 1 _aIwata, Tetsu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_992633
710 2 _aSpringerLink (Online service)
_992634
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030053772
776 0 8 _iPrinted edition:
_z9783030053796
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11356
_992635
856 4 0 _uhttps://doi.org/10.1007/978-3-030-05378-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86820
_d86820