LEADER 03579nam 22007575 450 001 9910483163403321 005 20251226195346.0 010 $a3-642-40084-1 024 7 $a10.1007/978-3-642-40084-1 035 $a(CKB)3710000000015892 035 $a(SSID)ssj0000988019 035 $a(PQKBManifestationID)11621027 035 $a(PQKBTitleCode)TC0000988019 035 $a(PQKBWorkID)10948295 035 $a(PQKB)10655059 035 $a(DE-He213)978-3-642-40084-1 035 $a(MiAaPQ)EBC3093058 035 $a(PPN)172428947 035 $a(EXLCZ)993710000000015892 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology ? CRYPTO 2013 $e33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II /$fedited by Ran Canetti, Juan A. Garay 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVIII, 558 p. 31 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8043 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40083-3 327 $aImplementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption. 330 $aThe two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8043 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputer science 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputer science. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Science. 676 $a005.82 702 $aCanetti$b Ran$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaray$b Juan A.$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483163403321 996 $aAdvances in Cryptology ? CRYPTO 2013$92830070 997 $aUNINA