04410nam 22008175 450 99646549290331620200705043355.03-662-53887-310.1007/978-3-662-53887-6(CKB)3710000000981137(DE-He213)978-3-662-53887-6(MiAaPQ)EBC6283566(MiAaPQ)EBC5594846(Au-PeEL)EBL5594846(OCoLC)963936126(PPN)197137148(EXLCZ)99371000000098113720161108d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2016[electronic resource] 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /edited by Jung Hee Cheon, Tsuyoshi Takagi1st ed. 2016.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2016.1 online resource (XXIV, 941 p. 217 illus.) Security and Cryptology ;100313-662-53886-5 Includes bibliographical references and index.Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation.The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.Security and Cryptology ;10031Data encryption (Computer science)Computer securityCoding theoryInformation theoryManagement information systemsComputer scienceComputersComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Mathematics of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I17001Data encryption (Computer science).Computer security.Coding theory.Information theory.Management information systems.Computer science.Computers.Computer science—Mathematics.Cryptology.Systems and Data Security.Coding and Information Theory.Management of Computing and Information Systems.Theory of Computation.Mathematics of Computing.005.8Cheon Jung Heeedthttp://id.loc.gov/vocabulary/relators/edtTakagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465492903316Advances in Cryptology – ASIACRYPT 20162809400UNISA