03640nam 22008055 450 991048499670332120251225205323.03-319-70697-710.1007/978-3-319-70697-9(CKB)4340000000223552(DE-He213)978-3-319-70697-9(MiAaPQ)EBC6299133(MiAaPQ)EBC5595850(Au-PeEL)EBL5595850(OCoLC)1013928004(PPN)221251650(EXLCZ)99434000000022355220171118d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II /edited by Tsuyoshi Takagi, Thomas Peyrin1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XIX, 701 p. 98 illus.) Security and Cryptology,2946-1863 ;106253-319-70696-9 Pairing-based Protocols -- Quantum Algorithms -- Elliptic Curves -- Block Chains -- Multi-Party Protocols.-Operating Modes Security Proofs.The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.Security and Cryptology,2946-1863 ;10625CryptographyData encryption (Computer science)Data protectionCoding theoryInformation theoryElectronic data processingManagementComputer scienceComputer scienceMathematicsCryptologyData and Information SecurityCoding and Information TheoryIT OperationsTheory of ComputationMathematics of ComputingCryptography.Data encryption (Computer science).Data protection.Coding theory.Information theory.Electronic data processingManagement.Computer science.Computer scienceMathematics.Cryptology.Data and Information Security.Coding and Information Theory.IT Operations.Theory of Computation.Mathematics of Computing.005.82Takagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtPeyrin Thomasedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484996703321Advances in Cryptology – ASIACRYPT 20172808718UNINA