03839nam 22007815 450 991034939300332120210808080120.03-030-03810-610.1007/978-3-030-03810-6(CKB)4100000007127645(DE-He213)978-3-030-03810-6(MiAaPQ)EBC6307252(PPN)23247088X(EXLCZ)99410000000712764520181107d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierTheory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II /edited by Amos Beimel, Stefan Dziembowski1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XVII, 732 p. 318 illus., 22 illus. in color.)Security and Cryptology ;112403-030-03809-2 MPC protocols -- Order-revealing encryption and symmetric encryption -- Information-theoretic cryptography II and quantum cryptography -- LWE-based cryptography -- iO and authentication -- ORAM and PRF.The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;11240Data encryption (Computer science)Computer securityComputersLaw and legislationComputers and civilizationComputer communication systemsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer security.Computers.Law and legislation.Computers and civilization.Computer communication systems.Management information systems.Computer science.Cryptology.Systems and Data Security.Legal Aspects of Computing.Computers and Society.Computer Communication Networks.Management of Computing and Information Systems.005.82005.824Beimel Amosedthttp://id.loc.gov/vocabulary/relators/edtDziembowski Stefanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349393003321Theory of Cryptography3000229UNINA