LEADER 04080nam 22007335 450 001 9910349415203321 005 20251225203722.0 010 $a9783319968841 010 $a331996884X 024 7 $a10.1007/978-3-319-96884-1 035 $a(CKB)4100000005679045 035 $a(DE-He213)978-3-319-96884-1 035 $a(MiAaPQ)EBC6280827 035 $a(PPN)229915957 035 $a(MiAaPQ)EBC6275243 035 $a(EXLCZ)994100000005679045 100 $a20180724d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2018 $e38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19?23, 2018, Proceedings, Part I /$fedited by Hovav Shacham, Alexandra Boldyreva 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXIII, 823 p. 133 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10991 311 08$a9783319968834 311 08$a3319968831 327 $aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 330 $aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10991 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aMathematical statistics 606 $aSoftware engineering 606 $aCryptology 606 $aCoding and Information Theory 606 $aProbability and Statistics in Computer Science 606 $aSoftware Engineering 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aMathematical statistics. 615 0$aSoftware engineering. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aProbability and Statistics in Computer Science. 615 24$aSoftware Engineering. 676 $a005.82 702 $aShacham$b Hovav$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBoldyreva$b Alexandra$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349415203321 996 $aAdvances in Cryptology ? CRYPTO 2018$91912516 997 $aUNINA