LEADER 03315nam 22006135 450 001 9910484289103321 005 20200703230530.0 010 $a3-319-03515-0 024 7 $a10.1007/978-3-319-03515-4 035 $a(CKB)3710000000078774 035 $a(Springer)9783319035154 035 $a(MH)013884345-7 035 $a(SSID)ssj0001091738 035 $a(PQKBManifestationID)11597914 035 $a(PQKBTitleCode)TC0001091738 035 $a(PQKBWorkID)11027963 035 $a(PQKB)10173331 035 $a(DE-He213)978-3-319-03515-4 035 $a(MiAaPQ)EBC3096836 035 $a(PPN)176108041 035 $a(EXLCZ)993710000000078774 100 $a20131202d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProgress in Cryptology - INDOCRYPT 2013 $e14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings /$fedited by Goutam Paul, Paul Vaudenay 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XVIII, 319 p. 64 illus.)$conline resource 225 1 $aSecurity and Cryptology ;$v8250 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-03514-2 320 $aIncludes bibliographical references and index. 327 $aProvable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory in cryptography. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography. 410 0$aSecurity and Cryptology ;$v8250 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 14$aCryptology. 615 24$aSystems and Data Security. 676 $a005.82 702 $aPaul$b Goutam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaudenay$b Paul$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910484289103321 996 $aProgress in Cryptology - INDOCRYPT 2013$92557487 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress