LEADER 03839nam 22007815 450 001 9910349393003321 005 20210808080120.0 010 $a3-030-03810-6 024 7 $a10.1007/978-3-030-03810-6 035 $a(CKB)4100000007127645 035 $a(DE-He213)978-3-030-03810-6 035 $a(MiAaPQ)EBC6307252 035 $a(PPN)23247088X 035 $a(EXLCZ)994100000007127645 100 $a20181107d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e16th International Conference, TCC 2018, Panaji, India, November 11?14, 2018, Proceedings, Part II /$fedited by Amos Beimel, Stefan Dziembowski 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 732 p. 318 illus., 22 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11240 311 $a3-030-03809-2 327 $aMPC protocols -- Order-revealing encryption and symmetric encryption -- Information-theoretic cryptography II and quantum cryptography -- LWE-based cryptography -- iO and authentication -- ORAM and PRF. 330 $aThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology ;$v11240 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aLaw and legislation 606 $aComputers and civilization 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 676 $a005.824 702 $aBeimel$b Amos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDziembowski$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349393003321 996 $aTheory of Cryptography$93000229 997 $aUNINA