LEADER 03996nam 22007455 450 001 9910483702103321 005 20200630104522.0 010 $a3-662-44381-3 024 7 $a10.1007/978-3-662-44381-1 035 $a(CKB)3710000000219536 035 $a(SSID)ssj0001295719 035 $a(PQKBManifestationID)11754002 035 $a(PQKBTitleCode)TC0001295719 035 $a(PQKBWorkID)11346536 035 $a(PQKB)11581774 035 $a(DE-He213)978-3-662-44381-1 035 $a(MiAaPQ)EBC6303560 035 $a(MiAaPQ)EBC5610427 035 $a(Au-PeEL)EBL5610427 035 $a(OCoLC)884894138 035 $a(PPN)179925989 035 $a(EXLCZ)993710000000219536 100 $a20140714d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- CRYPTO 2014 $e34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II /$fedited by Juan A. Garay, Rosario Gennaro 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 532 p. 53 illus.) 225 1 $aSecurity and Cryptology ;$v8617 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-44380-5 320 $aIncludes bibliographical references and index. 327 $aQuantum Cryptography -- Foundations of Hardness -- Obfuscation.- Number-Theoretic Hardness -- Side Channels and Leakage Resilience -- Information-Theoretic Security -- Key Exchange and Secure Communication -- Zero Knowledge -- Composable Security -- Secure Computation ? Foundations -- Secure Computation ? Implementations. 330 $aThe two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations. 410 0$aSecurity and Cryptology ;$v8617 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aGaray$b Juan A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGennaro$b Rosario$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483702103321 996 $aAdvances in Cryptology -- CRYPTO 2014$92587623 997 $aUNINA