03509nam 22007335 450 99646621930331620200705040509.03-319-70500-810.1007/978-3-319-70500-2(CKB)4340000000223540(DE-He213)978-3-319-70500-2(MiAaPQ)EBC5590656(PPN)22125160X(EXLCZ)99434000000022354020171104d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierTheory of Cryptography[electronic resource] 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I /edited by Yael Kalai, Leonid Reyzin1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XVII, 812 p. 80 illus.) Security and Cryptology ;106773-319-70499-0 The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;10677Data encryption (Computer science)Computer securityComputersLaw and legislationComputers and civilizationComputer communication systemsApplication softwareCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Data encryption (Computer science).Computer security.Computers.Law and legislation.Computers and civilization.Computer communication systems.Application software.Cryptology.Systems and Data Security.Legal Aspects of Computing.Computers and Society.Computer Communication Networks.Information Systems Applications (incl. Internet).005.8Kalai Yaeledthttp://id.loc.gov/vocabulary/relators/edtReyzin Leonidedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466219303316Theory of Cryptography772206UNISA