04186nam 22006495 450 991034941520332120200705185208.03-319-96884-X10.1007/978-3-319-96884-1(CKB)4100000005679045(DE-He213)978-3-319-96884-1(MiAaPQ)EBC6280827(PPN)229915957(EXLCZ)99410000000567904520180724d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I /edited by Hovav Shacham, Alexandra Boldyreva1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XXIII, 823 p. 133 illus.) Security and Cryptology ;109913-319-96883-1 Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation.The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.Security and Cryptology ;10991Data encryption (Computer science)Coding theoryInformation theoryMathematical statisticsSoftware engineeringCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Probability and Statistics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17036Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Data encryption (Computer science).Coding theory.Information theory.Mathematical statistics.Software engineering.Cryptology.Coding and Information Theory.Probability and Statistics in Computer Science.Software Engineering/Programming and Operating Systems.005.82Shacham Hovavedthttp://id.loc.gov/vocabulary/relators/edtBoldyreva Alexandraedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349415203321Advances in Cryptology – CRYPTO 20181912516UNINA