03909nam 22008175 450 991048366410332120251226203119.03-662-53887-310.1007/978-3-662-53887-6(CKB)3710000000981137(DE-He213)978-3-662-53887-6(MiAaPQ)EBC6283566(MiAaPQ)EBC5594846(Au-PeEL)EBL5594846(OCoLC)963936126(PPN)197137148(EXLCZ)99371000000098113720161108d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /edited by Jung Hee Cheon, Tsuyoshi Takagi1st ed. 2016.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2016.1 online resource (XXIV, 941 p. 217 illus.) Security and Cryptology,2946-1863 ;100313-662-53886-5 Includes bibliographical references and index.Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation.The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.Security and Cryptology,2946-1863 ;10031CryptographyData encryption (Computer science)Data protectionCoding theoryInformation theoryElectronic data processingManagementComputer scienceComputer scienceMathematicsCryptologyData and Information SecurityCoding and Information TheoryIT OperationsTheory of ComputationMathematics of ComputingCryptography.Data encryption (Computer science).Data protection.Coding theory.Information theory.Electronic data processingManagement.Computer science.Computer scienceMathematics.Cryptology.Data and Information Security.Coding and Information Theory.IT Operations.Theory of Computation.Mathematics of Computing.005.8Cheon Jung Heeedthttp://id.loc.gov/vocabulary/relators/edtTakagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483664103321Advances in Cryptology – ASIACRYPT 20162809400UNINA