03839nam 22007695 450 99646627770331620210808080120.03-030-03810-610.1007/978-3-030-03810-6(CKB)4100000007127645(DE-He213)978-3-030-03810-6(MiAaPQ)EBC6307252(PPN)23247088X(EXLCZ)99410000000712764520181107d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierTheory of Cryptography[electronic resource] 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II /edited by Amos Beimel, Stefan Dziembowski1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XVII, 732 p. 318 illus., 22 illus. in color.)Security and Cryptology ;112403-030-03809-2 MPC protocols -- Order-revealing encryption and symmetric encryption -- Information-theoretic cryptography II and quantum cryptography -- LWE-based cryptography -- iO and authentication -- ORAM and PRF.The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;11240Data encryption (Computer science)Computer securityComputersLaw and legislationComputers and civilizationComputer communication systemsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer security.Computers.Law and legislation.Computers and civilization.Computer communication systems.Management information systems.Computer science.Cryptology.Systems and Data Security.Legal Aspects of Computing.Computers and Society.Computer Communication Networks.Management of Computing and Information Systems.005.82Beimel Amosedthttp://id.loc.gov/vocabulary/relators/edtDziembowski Stefanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466277703316Theory of Cryptography772206UNISA00903nam0 22002773i 450 TO0053459720231121125838.0044470320920141209d1987 ||||0itac50 baengnlz01i xxxe z01nSupercomputingthe state of the artedited by A. Lichnewsky, C. SaguezAmsterdamNorth-Holland1987VIII, 479 p.ill.24 cm.Lichnewski, A.TO0V244392Saguez, C.TO0V252033ITIT-0120141209IT-FR0099 Biblioteca Area IngegneristicaFR0099 TO00534597Biblioteca Area Ingegneristica 54S. L. 004 SUP 54EXF0000010025 VMB RS A 2005011320191003 54Supercomputing2581389UNICAS