LEADER 03876nam 22007815 450 001 9910349394903321 005 20210808075943.0 010 $a3-030-03807-6 024 7 $a10.1007/978-3-030-03807-6 035 $a(CKB)4100000007111091 035 $a(DE-He213)978-3-030-03807-6 035 $a(MiAaPQ)EBC6302603 035 $a(PPN)232470871 035 $a(EXLCZ)994100000007111091 100 $a20181104d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e16th International Conference, TCC 2018, Panaji, India, November 11?14, 2018, Proceedings, Part I /$fedited by Amos Beimel, Stefan Dziembowski 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 720 p. 80 illus., 11 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11239 311 $a3-030-03806-8 327 $aMemory-based functions and complexity theory -- Two-round MPC protocols -- Zero knowledge -- Information-theoretic cryptography -- Trapdoor permutations and signatures -- Coin-tossing and fairness -- Functional and identity-based encryption. 330 $aThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology ;$v11239 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aLaw and legislation 606 $aComputers and civilization 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 676 $a005.824 702 $aBeimel$b Amos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDziembowski$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349394903321 996 $aTheory of Cryptography$93000229 997 $aUNINA