000 | 03873nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-319-96878-0 | ||
003 | DE-He213 | ||
005 | 20240730173218.0 | ||
007 | cr nn 008mamaa | ||
008 | 180723s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319968780 _9978-3-319-96878-0 |
||
024 | 7 |
_a10.1007/978-3-319-96878-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - CRYPTO 2018 _h[electronic resource] : _b38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III / _cedited by Hovav Shacham, Alexandra Boldyreva. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXV, 787 p. 93 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10993 |
|
505 | 0 | _aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. | |
520 | _aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aMathematical statistics. _99597 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aProbability and Statistics in Computer Science. _931857 |
700 | 1 |
_aShacham, Hovav. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107431 |
|
700 | 1 |
_aBoldyreva, Alexandra. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107432 |
|
710 | 2 |
_aSpringerLink (Online service) _9107433 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319968773 |
776 | 0 | 8 |
_iPrinted edition: _z9783319968797 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10993 _9107434 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-96878-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88807 _d88807 |