03485nam 22007335 450 991048502970332120200705040509.03-319-70500-810.1007/978-3-319-70500-2(CKB)4340000000223540(DE-He213)978-3-319-70500-2(MiAaPQ)EBC5590656(PPN)22125160X(EXLCZ)99434000000022354020171104d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierTheory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I /edited by Yael Kalai, Leonid Reyzin1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XVII, 812 p. 80 illus.) Security and Cryptology ;106773-319-70499-0 The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;10677Data encryption (Computer science)Computer securityComputersLaw and legislationComputers and civilizationComputer communication systemsApplication softwareCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Data encryption (Computer science).Computer security.Computers.Law and legislation.Computers and civilization.Computer communication systems.Application software.Cryptology.Systems and Data Security.Legal Aspects of Computing.Computers and Society.Computer Communication Networks.Information Systems Applications (incl. Internet).005.8Kalai Yaeledthttp://id.loc.gov/vocabulary/relators/edtReyzin Leonidedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910485029703321Theory of Cryptography3000229UNINA