LEADER 03795nam 22006855 450 001 9910483376303321 005 20251226202856.0 010 $a3-662-53015-5 024 7 $a10.1007/978-3-662-53015-3 035 $a(CKB)3710000000765286 035 $a(DE-He213)978-3-662-53015-3 035 $a(MiAaPQ)EBC5585312 035 $a(PPN)194515230 035 $a(EXLCZ)993710000000765286 100 $a20160720d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2016 $e36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III /$fedited by Matthew Robshaw, Jonathan Katz 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 651 p. 77 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9816 311 1 $a3-662-53014-7 327 $aProvable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric cryptography -- Symmetric cryptography -- Cryptanalytic tools -- Hardware-oriented cryptography -- Secure computation and protocols -- Obfuscation -- Quantum techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis -- Zero knowledge -- Theory. 330 $aThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9816 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aRobshaw$b Matthew$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatz$b Jonathan$f1974-$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483376303321 996 $aAdvances in Cryptology ? CRYPTO 2016$92808738 997 $aUNINA