LEADER 03885nam 22006735 450 001 9910349415403321 005 20251225203718.0 010 $a9783319968780 010 $a3319968785 024 7 $a10.1007/978-3-319-96878-0 035 $a(CKB)4100000005679043 035 $a(DE-He213)978-3-319-96878-0 035 $a(MiAaPQ)EBC6284361 035 $a(PPN)229915930 035 $a(MiAaPQ)EBC6275241 035 $a(EXLCZ)994100000005679043 100 $a20180723d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2018 $e38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19?23, 2018, Proceedings, Part III /$fedited by Hovav Shacham, Alexandra Boldyreva 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XV, 787 p. 93 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10993 300 $aIncludes index. 311 08$a9783319968773 311 08$a3319968777 327 $aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 330 $aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10993 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputer science$xMathematics 606 $aMathematical statistics 606 $aCryptology 606 $aSoftware Engineering 606 $aProbability and Statistics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputer science$xMathematics. 615 0$aMathematical statistics. 615 14$aCryptology. 615 24$aSoftware Engineering. 615 24$aProbability and Statistics in Computer Science. 676 $a005.82 702 $aShacham$b Hovav$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBoldyreva$b Alexandra$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349415403321 996 $aAdvances in Cryptology ? CRYPTO 2018$91912516 997 $aUNINA