000 | 03181nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-031-07082-2 | ||
003 | DE-He213 | ||
005 | 20240730173312.0 | ||
007 | cr nn 008mamaa | ||
008 | 220528s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031070822 _9978-3-031-07082-2 |
||
024 | 7 |
_a10.1007/978-3-031-07082-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - EUROCRYPT 2022 _h[electronic resource] : _b41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III / _cedited by Orr Dunkelman, Stefan Dziembowski. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXVII, 831 p. 64 illus., 2 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13277 |
|
520 | _aThe 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9107827 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9107828 |
650 | 2 | 4 |
_aComputer Communication Networks. _9107829 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aDunkelman, Orr. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107830 |
|
700 | 1 |
_aDziembowski, Stefan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107831 |
|
710 | 2 |
_aSpringerLink (Online service) _9107832 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031070815 |
776 | 0 | 8 |
_iPrinted edition: _z9783031070839 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13277 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-07082-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88857 _d88857 |