LEADER 03470nam 22008055 450 001 9910349393003321 005 20251225205334.0 010 $a9783030038106 010 $a3030038106 024 7 $a10.1007/978-3-030-03810-6 035 $a(CKB)4100000007127645 035 $a(DE-He213)978-3-030-03810-6 035 $a(MiAaPQ)EBC6307252 035 $a(PPN)23247088X 035 $a(EXLCZ)994100000007127645 100 $a20181107d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e16th International Conference, TCC 2018, Panaji, India, November 11?14, 2018, Proceedings, Part II /$fedited by Amos Beimel, Stefan Dziembowski 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 732 p. 318 illus., 22 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11240 311 08$a9783030038090 311 08$a3030038092 327 $aMPC protocols -- Order-revealing encryption and symmetric encryption -- Information-theoretic cryptography II and quantum cryptography -- LWE-based cryptography -- iO and authentication -- ORAM and PRF. 330 $aThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11240 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 676 $a005.82 676 $a005.824 702 $aBeimel$b Amos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDziembowski$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349393003321 996 $aTheory of Cryptography$93000229 997 $aUNINA