LEADER 04746nam 22008895 450 001 9910484064703321 005 20200705225625.0 010 $a3-662-45608-7 024 7 $a10.1007/978-3-662-45608-8 035 $a(CKB)3710000000306316 035 $a(SSID)ssj0001386310 035 $a(PQKBManifestationID)11766747 035 $a(PQKBTitleCode)TC0001386310 035 $a(PQKBWorkID)11373744 035 $a(PQKB)11648599 035 $a(DE-He213)978-3-662-45608-8 035 $a(MiAaPQ)EBC6287729 035 $a(MiAaPQ)EBC5586167 035 $a(Au-PeEL)EBL5586167 035 $a(OCoLC)1066192245 035 $a(PPN)183094751 035 $a(EXLCZ)993710000000306316 100 $a20141106d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- ASIACRYPT 2014 $e20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II /$fedited by Palash Sarkar, Tetsu Iwata 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XXII, 528 p. 76 illus.) 225 1 $aSecurity and Cryptology ;$v8874 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-45607-9 320 $aIncludes bibliographical references and index. 327 $aCryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation. 330 $aThe two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation. 410 0$aSecurity and Cryptology ;$v8874 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aManagement information systems 606 $aComputer science 606 $aComputers 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aManagement of Computing and Information Systems. 615 24$aTheory of Computation. 615 24$aMathematics of Computing. 676 $a005.82 702 $aSarkar$b Palash$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIwata$b Tetsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484064703321 996 $aAdvances in Cryptology -- ASIACRYPT 2014$92587616 997 $aUNINA