LEADER 03828nam 22007335 450 001 996198258803316 005 20200630104516.0 010 $a3-662-44371-6 024 7 $a10.1007/978-3-662-44371-2 035 $a(CKB)3710000000219535 035 $a(SSID)ssj0001295718 035 $a(PQKBManifestationID)11777908 035 $a(PQKBTitleCode)TC0001295718 035 $a(PQKBWorkID)11346535 035 $a(PQKB)10072309 035 $a(DE-He213)978-3-662-44371-2 035 $a(MiAaPQ)EBC6298427 035 $a(MiAaPQ)EBC5610744 035 $a(Au-PeEL)EBL5610744 035 $a(OCoLC)884893815 035 $a(PPN)179925962 035 $a(EXLCZ)993710000000219535 100 $a20140714d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology -- CRYPTO 2014$b[electronic resource] $e34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I /$fedited by Juan A. Garay, Rosario Gennaro 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 574 p. 52 illus.) 225 1 $aSecurity and Cryptology ;$v8616 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-44370-8 327 $aSymmetric Encryption and PRFs -- Formal Methods -- Hash Functions -- Groups and Maps -- Lattices.- Asymmetric Encryption and Signatures -- Side Channels and Leakage Resilience -- Obfuscation -- FHE. 330 $aThe two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations. 410 0$aSecurity and Cryptology ;$v8616 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aGaray$b Juan A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGennaro$b Rosario$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996198258803316 996 $aAdvances in Cryptology -- CRYPTO 2014$92587623 997 $aUNISA