LEADER 03331nam 22006855 450 001 9910349391803321 005 20251225205515.0 010 $a9783030033293 010 $a3030033295 024 7 $a10.1007/978-3-030-03329-3 035 $a(CKB)4100000007158796 035 $a(DE-He213)978-3-030-03329-3 035 $a(MiAaPQ)EBC6298838 035 $a(PPN)232470715 035 $a(EXLCZ)994100000007158796 100 $a20181026d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2018 $e24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2?6, 2018, Proceedings, Part II /$fedited by Thomas Peyrin, Steven Galbraith 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 767 p. 182 illus., 50 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11273 311 08$a9783030033286 311 08$a3030033287 327 $aSymmetric-Key Cryptanalysis -- Public Key and Identity-Based Encryption -- Side-Channels -- Signatures -- Leakage-Resilient Cryptography -- Functional/Inner Product/Predicate Encrpytion. 330 $aThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11273 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputer networks 606 $aArtificial intelligence 606 $aCryptology 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aArtificial Intelligence 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 676 $a005.82 676 $a005.824 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGalbraith$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349391803321 996 $aAdvances in Cryptology ? ASIACRYPT 2018$91934717 997 $aUNINA