LEADER 03769nam 22007815 450 001 9910484853503321 005 20200704081515.0 010 $a3-662-49096-X 024 7 $a10.1007/978-3-662-49096-9 035 $a(CKB)3780000000093485 035 $a(SSID)ssj0001599577 035 $a(PQKBManifestationID)16305947 035 $a(PQKBTitleCode)TC0001599577 035 $a(PQKBWorkID)14892275 035 $a(PQKB)10682697 035 $a(DE-He213)978-3-662-49096-9 035 $a(MiAaPQ)EBC5576723 035 $a(PPN)190884894 035 $a(EXLCZ)993780000000093485 100 $a20151218d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $e13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /$fedited by Eyal Kushilevitz, Tal Malkin 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 618 p. 63 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9562 300 $aIncludes index. 311 $a3-662-49095-1 330 $aThe two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. . 410 0$aSecurity and Cryptology ;$v9562 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a004 702 $aKushilevitz$b Eyal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalkin$b Tal$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484853503321 996 $aTheory of Cryptography$93000229 997 $aUNINA