000 03903nam a22006975i 4500
001 978-3-030-45388-6
003 DE-He213
005 20240730174959.0
007 cr nn 008mamaa
008 200411s2020 sz | s |||| 0|eng d
020 _a9783030453886
_9978-3-030-45388-6
024 7 _a10.1007/978-3-030-45388-6
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aPublic-Key Cryptography - PKC 2020
_h[electronic resource] :
_b23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II /
_cedited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXIX, 658 p. 452 illus., 26 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12111
505 0 _aFunctional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes.
520 _aThe two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aComputer networks .
_931572
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aComputers.
_98172
650 1 4 _aCryptology.
_931769
650 2 4 _aSecurity Services.
_978910
650 2 4 _aMobile and Network Security.
_933624
650 2 4 _aComputer Communication Networks.
_9114936
650 2 4 _aCoding and Information Theory.
_9114937
650 2 4 _aComputing Milieux.
_955441
700 1 _aKiayias, Aggelos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9114938
700 1 _aKohlweiss, Markulf.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9114939
700 1 _aWallden, Petros.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9114940
700 1 _aZikas, Vassilis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9114941
710 2 _aSpringerLink (Online service)
_9114942
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030453879
776 0 8 _iPrinted edition:
_z9783030453893
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12111
_9114943
856 4 0 _uhttps://doi.org/10.1007/978-3-030-45388-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89721
_d89721