LEADER 03883nam 22007935 450 001 996202814203316 005 20200704081532.0 010 $a3-662-49099-4 024 7 $a10.1007/978-3-662-49099-0 035 $a(CKB)3780000000093486 035 $a(SSID)ssj0001599578 035 $a(PQKBManifestationID)16305815 035 $a(PQKBTitleCode)TC0001599578 035 $a(PQKBWorkID)14892269 035 $a(PQKB)11725277 035 $a(DE-He213)978-3-662-49099-0 035 $a(MiAaPQ)EBC5578191 035 $a(PPN)190884908 035 $a(EXLCZ)993780000000093486 100 $a20151224d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography$b[electronic resource] $e13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /$fedited by Eyal Kushilevitz, Tal Malkin 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 596 p. 63 illus.) 225 1 $aSecurity and Cryptology ;$v9563 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-49098-6 320 $aIncludes bibliographical references and index. 330 $aThe two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. . 410 0$aSecurity and Cryptology ;$v9563 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aKushilevitz$b Eyal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalkin$b Tal$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996202814203316 996 $aTheory of Cryptography$9772206 997 $aUNISA