LEADER 03469nam 22008415 450 001 9910485031003321 005 20251226193517.0 010 $a3-662-49099-4 024 7 $a10.1007/978-3-662-49099-0 035 $a(CKB)3780000000093486 035 $a(SSID)ssj0001599578 035 $a(PQKBManifestationID)16305815 035 $a(PQKBTitleCode)TC0001599578 035 $a(PQKBWorkID)14892269 035 $a(PQKB)11725277 035 $a(DE-He213)978-3-662-49099-0 035 $a(MiAaPQ)EBC5578191 035 $a(PPN)190884908 035 $a(EXLCZ)993780000000093486 100 $a20151224d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $e13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /$fedited by Eyal Kushilevitz, Tal Malkin 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 596 p. 63 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9563 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-662-49098-6 320 $aIncludes bibliographical references and index. 330 $aThe two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9563 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer science 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aTheory of Computation 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aTheory of Computation. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aKushilevitz$b Eyal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalkin$b Tal$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485031003321 996 $aTheory of Cryptography$93000229 997 $aUNINA