04106nam 22006735 450 99641830520331620200703094655.03-030-45721-410.1007/978-3-030-45721-1(CKB)4100000011273676(MiAaPQ)EBC6303145(DE-He213)978-3-030-45721-1(PPN)248394517(EXLCZ)99410000001127367620200501d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – EUROCRYPT 2020[electronic resource] 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I /edited by Anne Canteaut, Yuval Ishai1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (xxv, 797 pages) illustrationsSecurity and Cryptology ;121053-030-45720-6 Invited Talk -- Best Paper Awards -- Obfuscation and Functional Encryption -- Symmetric Cryptanalysis -- Randomness Extraction -- Symmetric Cryptography I -- Secret Sharing -- Fault-Attack Security -- Succinct Proofs.The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.Security and Cryptology ;12105Data encryption (Computer science)ComputersComputer communication systemsComputer securityData structures (Computer science)Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Data encryption (Computer science).Computers.Computer communication systems.Computer security.Data structures (Computer science).Cryptology.Information Systems and Communication Service.Computer Communication Networks.Systems and Data Security.Data Structures and Information Theory.001.5436Canteaut Anneedthttp://id.loc.gov/vocabulary/relators/edtIshai Yuvaledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418305203316Advances in Cryptology – EUROCRYPT 20201961611UNISA