LEADER 03322nam 22006975 450 001 9910349391903321 005 20251225201928.0 010 $a9783030033262 010 $a3030033260 024 7 $a10.1007/978-3-030-03326-2 035 $a(CKB)4100000007158795 035 $a(DE-He213)978-3-030-03326-2 035 $a(MiAaPQ)EBC6302116 035 $a(PPN)232470707 035 $a(EXLCZ)994100000007158795 100 $a20181026d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2018 $e24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2?6, 2018, Proceedings, Part I /$fedited by Thomas Peyrin, Steven Galbraith 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXIV, 659 p. 120 illus., 50 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11272 311 08$a9783030033255 311 08$a3030033252 320 $aIncludes bibliographical references and index. 327 $aPost-Quantum Cryptanalysis -- Encrypted Storage -- Symmetric-Key Constructions -- Lattice Cryptography -- Quantum Symmetric Cryptanalysis -- Zero-Knowledge. 330 $aThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11272 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputer networks 606 $aComputers 606 $aCryptology 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aComputing Milieux 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aComputers. 615 14$aCryptology. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 676 $a005.82 676 $a005.824 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGalbraith$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349391903321 996 $aAdvances in Cryptology ? ASIACRYPT 2018$91934717 997 $aUNINA