LEADER 04123nam 22006255 450 001 9910349415303321 005 20200705185158.0 010 $a3-319-96881-5 024 7 $a10.1007/978-3-319-96881-0 035 $a(CKB)4100000005679044 035 $a(DE-He213)978-3-319-96881-0 035 $a(MiAaPQ)EBC6303189 035 $a(PPN)229915949 035 $a(EXLCZ)994100000005679044 100 $a20180723d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2018 $e38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19?23, 2018, Proceedings, Part II /$fedited by Hovav Shacham, Alexandra Boldyreva 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XV, 833 p. 113 illus.) 225 1 $aSecurity and Cryptology ;$v10992 311 $a3-319-96880-7 327 $aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 330 $aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 410 0$aSecurity and Cryptology ;$v10992 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aInput-output equipment (Computers) 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aInput/Output and Data Communications$3https://scigraph.springernature.com/ontologies/product-market-codes/I12042 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aInput-output equipment (Computers). 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aInput/Output and Data Communications. 615 24$aArtificial Intelligence. 676 $a005.82 702 $aShacham$b Hovav$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBoldyreva$b Alexandra$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349415303321 996 $aAdvances in Cryptology ? CRYPTO 2018$91912516 997 $aUNINA