04128nam 22008055 450 991048499450332120200701075311.03-319-70694-210.1007/978-3-319-70694-8(CKB)4340000000223551(DE-He213)978-3-319-70694-8(MiAaPQ)EBC6283027(MiAaPQ)EBC5595519(Au-PeEL)EBL5595519(OCoLC)1015239223(PPN)221251685(EXLCZ)99434000000022355120171130d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I /edited by Tsuyoshi Takagi, Thomas Peyrin1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XXVI, 813 p. 121 illus.) Security and Cryptology ;106243-319-70693-4 Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Lattices -- Homomorphic Encryptions.-Access Control -- Oblivious Protocols -- Side Channel Analysis. .The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.Security and Cryptology ;10624Data encryption (Computer science)Computer securityCoding theoryInformation theoryManagement information systemsComputer scienceComputersComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Data encryption (Computer science).Computer security.Coding theory.Information theory.Management information systems.Computer science.Computers.Computer science—Mathematics.Cryptology.Systems and Data Security.Coding and Information Theory.Management of Computing and Information Systems.Theory of Computation.Mathematics of Computing.004Takagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtPeyrin Thomasedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484994503321Advances in Cryptology – ASIACRYPT 20172808718UNINA