LEADER 03928nam 22007455 450 001 9910483213803321 005 20200706032427.0 010 $a3-642-40041-8 024 7 $a10.1007/978-3-642-40041-4 035 $a(CKB)3710000000015890 035 $a(SSID)ssj0000988018 035 $a(PQKBManifestationID)11584606 035 $a(PQKBTitleCode)TC0000988018 035 $a(PQKBWorkID)10949247 035 $a(PQKB)10946644 035 $a(DE-He213)978-3-642-40041-4 035 $a(MiAaPQ)EBC3093299 035 $a(PPN)172428874 035 $a(EXLCZ)993710000000015890 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology ? CRYPTO 2013 $e33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I /$fedited by Ran Canetti, Juan A. Garay 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVIII, 590 p. 83 illus.) 225 1 $aSecurity and Cryptology ;$v8042 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40040-X 327 $aLattices and FHE -- Foundations of Hardness -- Cryptanalysis -- New Directions -- Leakage Resilience -- Symmetric Encryption and PRFs -- Key Exchange -- Multi Linear Maps -- Ideal Ciphers. 330 $aThe two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption. 410 0$aSecurity and Cryptology ;$v8042 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 615 0$aData encryption (Computer science) 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Science, general. 676 $a005.82 702 $aCanetti$b Ran$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaray$b Juan A$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483213803321 996 $aAdvances in Cryptology ? CRYPTO 2013$92830070 997 $aUNINA