000 | 03306nam a22005415i 4500 | ||
---|---|---|---|
999 |
_c200433786 _d51998 |
||
003 | DE-He213 | ||
005 | 20231104114219.0 | ||
007 | cr nn 008mamaa | ||
008 | 151126s2015 gw | s |||| 0|eng d | ||
020 |
_a9783662487976 _z978-3-662-48797-6 |
||
024 | 7 |
_a10.1007/978-3-662-48797-6 _2doi |
|
040 |
_aTR-AnTOB _beng _cTR-AnTOB _erda |
||
050 | 4 | _aQA76.9.D335 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema005.82 _223 |
|
245 | 1 | 0 |
_aAdvances in Cryptology -- ASIACRYPT 2015 : _b21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I / _cedited by Tetsu Iwata, Jung Hee Cheon. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aSecurity and Cryptology ; _v9452 |
|
520 | _aThe two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices. | ||
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer security. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation Systems. | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aComputer science. | |
650 | 1 | 4 |
_aCryptology. _0http://scigraph.springernature.com/things/product-market-codes/I28020 |
650 | 2 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
650 | 2 | 4 |
_aCoding and Information Theory. _0http://scigraph.springernature.com/things/product-market-codes/I15041 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0http://scigraph.springernature.com/things/product-market-codes/I24067 |
650 | 2 | 4 |
_aTheory of Computation. _0http://scigraph.springernature.com/things/product-market-codes/I16005 |
650 | 2 | 4 |
_aMathematics of Computing. _0http://scigraph.springernature.com/things/product-market-codes/I17001 |
700 | 1 |
_aIwata, Tetsu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCheon, Jung Hee. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_3Springer eBooks _zOnline access link to the resource _uhttps://doi.org/10.1007/978-3-662-48797-6 |
942 |
_2lcc _cEBK |
||
041 | _aeng |