03573nam 22007935 450 99646622710331620200701022827.03-319-27239-X10.1007/978-3-319-27239-9(CKB)4340000000001242(SSID)ssj0001599531(PQKBManifestationID)16305811(PQKBTitleCode)TC0001599531(PQKBWorkID)14892239(PQKB)11368348(DE-He213)978-3-319-27239-9(MiAaPQ)EBC6299245(MiAaPQ)EBC5595332(Au-PeEL)EBL5595332(OCoLC)933755587(PPN)190884711(EXLCZ)99434000000000124220151207d2015 u| 0engurnn|008mamaatxtccrCryptography and Coding[electronic resource] 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings /edited by Jens Groth1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (X, 329 p. 42 illus. in color.) Security and Cryptology ;9496Bibliographic Level Mode of Issuance: Monograph3-319-27238-1 Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience.This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.Security and Cryptology ;9496Data encryption (Computer science)Coding theoryInformation theoryAlgorithmsComputer securityComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Data encryption (Computer science).Coding theory.Information theory.Algorithms.Computer security.Computer science—Mathematics.Cryptology.Coding and Information Theory.Algorithm Analysis and Problem Complexity.Systems and Data Security.Discrete Mathematics in Computer Science.005.82Groth Jensedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466227103316Cryptography and Coding772174UNISA