LEADER 04512nam 22008415 450 001 9910484063003321 005 20200703235300.0 010 $a3-642-42033-8 024 7 $a10.1007/978-3-642-42033-7 035 $a(CKB)3710000000031301 035 $a(DE-He213)978-3-642-42033-7 035 $a(SSID)ssj0001067132 035 $a(PQKBManifestationID)11600872 035 $a(PQKBTitleCode)TC0001067132 035 $a(PQKBWorkID)11078907 035 $a(PQKB)10301628 035 $a(MiAaPQ)EBC3093133 035 $a(PPN)176117318 035 $a(EXLCZ)993710000000031301 100 $a20131123d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology - ASIACRYPT 2013 $e19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I /$fedited by Kazue Sako, Palash Sarkar 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XXIV, 546 p. 82 illus.) 225 1 $aSecurity and Cryptology ;$v8269 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-42032-X 327 $aMessage Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions. 330 $aThe two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions. 410 0$aSecurity and Cryptology ;$v8269 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer science?Mathematics 606 $aComputer security 606 $aApplied mathematics 606 $aEngineering mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aApplications of Mathematics$3https://scigraph.springernature.com/ontologies/product-market-codes/M13003 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer science?Mathematics. 615 0$aComputer security. 615 0$aApplied mathematics. 615 0$aEngineering mathematics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSystems and Data Security. 615 24$aApplications of Mathematics. 676 $a005.8 702 $aSako$b Kazue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSarkar$b Palash$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484063003321 996 $aAdvances in Cryptology - ASIACRYPT 2013$92554691 997 $aUNINA