LEADER 03172nam 22007575 450 001 9910485029703321 005 20251225212348.0 010 $a3-319-70500-8 024 7 $a10.1007/978-3-319-70500-2 035 $a(CKB)4340000000223540 035 $a(DE-He213)978-3-319-70500-2 035 $a(MiAaPQ)EBC5590656 035 $a(PPN)22125160X 035 $a(EXLCZ)994340000000223540 100 $a20171104d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I /$fedited by Yael Kalai, Leonid Reyzin 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVII, 812 p. 80 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10677 311 08$a3-319-70499-0 330 $aThe two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10677 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aComputer networks 606 $aApplication software 606 $aCryptology 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aKalai$b Yael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReyzin$b Leonid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485029703321 996 $aTheory of Cryptography$93000229 997 $aUNINA