04123nam 22006255 450 991034941530332120200705185158.03-319-96881-510.1007/978-3-319-96881-0(CKB)4100000005679044(DE-He213)978-3-319-96881-0(MiAaPQ)EBC6303189(PPN)229915949(EXLCZ)99410000000567904420180723d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II /edited by Hovav Shacham, Alexandra Boldyreva1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XV, 833 p. 113 illus.) Security and Cryptology ;109923-319-96880-7 Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation.The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.Security and Cryptology ;10992Data encryption (Computer science)Software engineeringInput-output equipment (Computers)Artificial intelligenceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Input/Output and Data Communicationshttps://scigraph.springernature.com/ontologies/product-market-codes/I12042Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Data encryption (Computer science).Software engineering.Input-output equipment (Computers).Artificial intelligence.Cryptology.Software Engineering/Programming and Operating Systems.Input/Output and Data Communications.Artificial Intelligence.005.82Shacham Hovavedthttp://id.loc.gov/vocabulary/relators/edtBoldyreva Alexandraedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349415303321Advances in Cryptology – CRYPTO 20181912516UNINA