03876nam 22007695 450 99646627990331620210808075943.03-030-03807-610.1007/978-3-030-03807-6(CKB)4100000007111091(DE-He213)978-3-030-03807-6(MiAaPQ)EBC6302603(PPN)232470871(EXLCZ)99410000000711109120181104d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierTheory of Cryptography[electronic resource] 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I /edited by Amos Beimel, Stefan Dziembowski1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XVII, 720 p. 80 illus., 11 illus. in color.)Security and Cryptology ;112393-030-03806-8 Memory-based functions and complexity theory -- Two-round MPC protocols -- Zero knowledge -- Information-theoretic cryptography -- Trapdoor permutations and signatures -- Coin-tossing and fairness -- Functional and identity-based encryption.The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.Security and Cryptology ;11239Data encryption (Computer science)Computer securityComputersLaw and legislationComputers and civilizationComputer communication systemsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer security.Computers.Law and legislation.Computers and civilization.Computer communication systems.Management information systems.Computer science.Cryptology.Systems and Data Security.Legal Aspects of Computing.Computers and Society.Computer Communication Networks.Management of Computing and Information Systems.005.82Beimel Amosedthttp://id.loc.gov/vocabulary/relators/edtDziembowski Stefanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466279903316Theory of Cryptography772206UNISA