LEADER 04789nam 22008415 450 001 9910482997003321 005 20200703235809.0 010 $a3-642-42045-1 024 7 $a10.1007/978-3-642-42045-0 035 $a(CKB)3710000000031302 035 $a(Springer)9783642420450 035 $a(MH)013859913-0 035 $a(SSID)ssj0001067133 035 $a(PQKBManifestationID)11600873 035 $a(PQKBTitleCode)TC0001067133 035 $a(PQKBWorkID)11073276 035 $a(PQKB)10969695 035 $a(DE-He213)978-3-642-42045-0 035 $a(MiAaPQ)EBC3093422 035 $a(PPN)176117350 035 $a(EXLCZ)993710000000031302 100 $a20131123d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology -- ASIACRYPT 2013 $e19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /$fedited by Kazue Sako, Palash Sarkar 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XXIV, 542 p. 58 illus.)$conline resource 225 1 $aSecurity and Cryptology ;$v8270 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-42044-3 327 $aMessage Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions. 330 $aThe two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions. 410 0$aSecurity and Cryptology ;$v8270 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer science?Mathematics 606 $aComputer security 606 $aApplied mathematics 606 $aEngineering mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aApplications of Mathematics$3https://scigraph.springernature.com/ontologies/product-market-codes/M13003 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer science?Mathematics. 615 0$aComputer security. 615 0$aApplied mathematics. 615 0$aEngineering mathematics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSystems and Data Security. 615 24$aApplications of Mathematics. 676 $a005.82 702 $aSako$b Kazue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSarkar$b Palash$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910482997003321 996 $aAdvances in Cryptology - ASIACRYPT 2013$92554691 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress