04746nam 22008895 450 991048406470332120200705225625.03-662-45608-710.1007/978-3-662-45608-8(CKB)3710000000306316(SSID)ssj0001386310(PQKBManifestationID)11766747(PQKBTitleCode)TC0001386310(PQKBWorkID)11373744(PQKB)11648599(DE-He213)978-3-662-45608-8(MiAaPQ)EBC6287729(MiAaPQ)EBC5586167(Au-PeEL)EBL5586167(OCoLC)1066192245(PPN)183094751(EXLCZ)99371000000030631620141106d2014 u| 0engurnn#008mamaatxtccrAdvances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II /edited by Palash Sarkar, Tetsu Iwata1st ed. 2014.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2014.1 online resource (XXII, 528 p. 76 illus.)Security and Cryptology ;8874Bibliographic Level Mode of Issuance: Monograph3-662-45607-9 Includes bibliographical references and index.Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation.The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.Security and Cryptology ;8874Data encryption (Computer science)Computer securityCoding theoryInformation theoryManagement information systemsComputer scienceComputersComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Data encryption (Computer science).Computer security.Coding theory.Information theory.Management information systems.Computer science.Computers.Computer science—Mathematics.Cryptology.Systems and Data Security.Coding and Information Theory.Management of Computing and Information Systems.Theory of Computation.Mathematics of Computing.005.82Sarkar Palashedthttp://id.loc.gov/vocabulary/relators/edtIwata Tetsuedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484064703321Advances in Cryptology -- ASIACRYPT 20142587616UNINA