LEADER 03999nam 22007695 450 001 9910483188703321 005 20251226193526.0 010 $a3-662-53008-2 024 7 $a10.1007/978-3-662-53008-5 035 $a(CKB)3710000000765285 035 $a(DE-He213)978-3-662-53008-5 035 $a(MiAaPQ)EBC6307171 035 $a(MiAaPQ)EBC5586190 035 $a(Au-PeEL)EBL5586190 035 $a(OCoLC)955278914 035 $a(PPN)194515206 035 $a(EXLCZ)993710000000765285 100 $a20160720d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2016 $e36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II /$fedited by Matthew Robshaw, Jonathan Katz 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 703 p. 94 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9815 300 $aIncludes index. 311 1 $a3-662-53007-4 327 $aProvable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric cryptography -- Symmetric cryptography -- Cryptanalytic tools -- Hardware-oriented cryptography -- Secure computation and protocols -- Obfuscation -- Quantum techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis -- Zero knowledge -- Theory. 330 $aThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9815 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aRobshaw$b Matthew$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatz$b Jonathan$f1974-$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483188703321 996 $aAdvances in Cryptology ? CRYPTO 2016$92808738 997 $aUNINA