LEADER 03616nam 22008175 450 001 9910484996803321 005 20251225205509.0 010 $a3-319-70700-0 024 7 $a10.1007/978-3-319-70700-6 035 $a(CKB)4340000000223553 035 $a(DE-He213)978-3-319-70700-6 035 $a(MiAaPQ)EBC6283484 035 $a(MiAaPQ)EBC5594783 035 $a(Au-PeEL)EBL5594783 035 $a(OCoLC)1013928138 035 $a(PPN)221251669 035 $a(EXLCZ)994340000000223553 100 $a20171117d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2017 $e23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III /$fedited by Tsuyoshi Takagi, Thomas Peyrin 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 473 p. 57 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10626 300 $aIncludes index. 311 08$a3-319-70699-3 327 $aCryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs. 330 $aThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10626 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aCoding theory 606 $aInformation theory 606 $aElectronic data processing$xManagement 606 $aComputer science 606 $aComputer science$xMathematics 606 $aCryptology 606 $aData and Information Security 606 $aCoding and Information Theory 606 $aIT Operations 606 $aTheory of Computation 606 $aMathematics of Computing 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aElectronic data processing$xManagement. 615 0$aComputer science. 615 0$aComputer science$xMathematics. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aCoding and Information Theory. 615 24$aIT Operations. 615 24$aTheory of Computation. 615 24$aMathematics of Computing. 676 $a005.82 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484996803321 996 $aAdvances in Cryptology ? ASIACRYPT 2017$92808718 997 $aUNINA