00937nam--2200373---450-99000306797020331620140417124931.005-711-1076-2000306797USA01000306797(ALEPH)000306797USA0100030679720080221d1977----km-y0itay50------baengGB||||||||001yyGaudeteby Ted HughesLondonFaber and Faber1977200 p.20 cm20012001001-------2001Poesia inglese821.914HUGHES,Ted163508ITsalbcISBD990003067970203316II.2.A.83851 DSLLBKDSLLDSLL9020080221USA011115MARANO9020140417USA011249Gaudete1023185UNISA03863nam 22007215 450 991048337620332120251226193535.03-662-53018-X10.1007/978-3-662-53018-4(CKB)3710000000765287(DE-He213)978-3-662-53018-4(MiAaPQ)EBC5584774(PPN)194515222(EXLCZ)99371000000076528720160720d2016 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I /edited by Matthew Robshaw, Jonathan Katz1st ed. 2016.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2016.1 online resource (XIII, 685 p. 114 illus.)Security and Cryptology,2946-1863 ;98143-662-53017-1 Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric cryptography -- Symmetric cryptography -- Cryptanalytic tools -- Hardware-oriented cryptography -- Secure computation and protocols -- Obfuscation -- Quantum techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis -- Zero knowledge -- Theory.The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.Security and Cryptology,2946-1863 ;9814CryptographyData encryption (Computer science)Data protectionAlgorithmsElectronic data processingManagementComputer scienceMathematicsDiscrete mathematicsCryptologyData and Information SecurityAlgorithmsIT OperationsDiscrete Mathematics in Computer ScienceCryptography.Data encryption (Computer science)Data protection.Algorithms.Electronic data processingManagement.Computer scienceMathematics.Discrete mathematics.Cryptology.Data and Information Security.Algorithms.IT Operations.Discrete Mathematics in Computer Science.005.82Robshaw Matthewedthttp://id.loc.gov/vocabulary/relators/edtKatz Jonathan1974-edthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483376203321Advances in Cryptology – CRYPTO 20162808738UNINA