LEADER 03771nam 22007095 450 001 9910739422903321 005 20200704123019.0 010 $a3-642-36594-9 024 7 $a10.1007/978-3-642-36594-2 035 $a(CKB)3520000000003542 035 $a(SSID)ssj0000870849 035 $a(PQKBManifestationID)11499169 035 $a(PQKBTitleCode)TC0000870849 035 $a(PQKBWorkID)10820721 035 $a(PQKB)10308406 035 $a(DE-He213)978-3-642-36594-2 035 $a(MiAaPQ)EBC3093486 035 $a(PPN)168330261 035 $a(EXLCZ)993520000000003542 100 $a20130217d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $e10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings /$fedited by Amit Sahai 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 726 p. 34 illus.) 225 1 $aSecurity and Cryptology ;$v7785 300 $aInternational conference proceedings. 311 $a3-642-36593-0 320 $aIncludes bibliographical references and author index. 327 $aStudy of known paradigms -- Approaches, and techniques, directed towards their better understanding and utilization -- Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones -- Formulation and treatment of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography. 330 $aThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. 410 0$aSecurity and Cryptology ;$v7785 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science) 615 0$aComputer security. 615 0$aComputers. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8/2 702 $aSahai$b Amit$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTheory of Cryptography Conference 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739422903321 996 $aTheory of Cryptography$93000229 997 $aUNINA