LEADER 03379nam 22008295 450 001 9910484853503321 005 20251226193419.0 010 $a3-662-49096-X 024 7 $a10.1007/978-3-662-49096-9 035 $a(CKB)3780000000093485 035 $a(SSID)ssj0001599577 035 $a(PQKBManifestationID)16305947 035 $a(PQKBTitleCode)TC0001599577 035 $a(PQKBWorkID)14892275 035 $a(PQKB)10682697 035 $a(DE-He213)978-3-662-49096-9 035 $a(MiAaPQ)EBC5576723 035 $a(PPN)190884894 035 $a(EXLCZ)993780000000093485 100 $a20151218d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $e13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /$fedited by Eyal Kushilevitz, Tal Malkin 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 618 p. 63 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9562 300 $aIncludes index. 311 08$a3-662-49095-1 330 $aThe two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9562 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer science 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aTheory of Computation 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aTheory of Computation. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a004 702 $aKushilevitz$b Eyal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalkin$b Tal$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484853503321 996 $aTheory of Cryptography$93000229 997 $aUNINA