LEADER 03925nam 22006615 450 001 996203611203316 005 20200702140600.0 010 $a3-642-55220-X 024 7 $a10.1007/978-3-642-55220-5 035 $a(CKB)3710000000106797 035 $a(Springer)9783642552205 035 $a(MH)014020892-5 035 $a(SSID)ssj0001204786 035 $a(PQKBManifestationID)11658751 035 $a(PQKBTitleCode)TC0001204786 035 $a(PQKBWorkID)11180613 035 $a(PQKB)11606827 035 $a(DE-He213)978-3-642-55220-5 035 $a(MiAaPQ)EBC3096837 035 $a(PPN)17832048X 035 $a(EXLCZ)993710000000106797 100 $a20140430d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2014$b[electronic resource] $e33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings /$fedited by Phong Q. Nguyen, Elisabeth Oswald 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 714 p. 77 illus.)$conline resource 225 1 $aSecurity and Cryptology ;$v8441 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-55219-6 320 $aIncludes bibliographical references and index. 327 $aPublic key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing -- Secret-key analysis and implementations -- Obfuscation and multi linear maps -- Authenticated encryption -- Symmetric encryption -- Multi-party encryption -- Side-channel attacks -- Signatures and public-key encryption -- Functional encryption -- Foundations -- Multi-party computation. 330 $aThis book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation. 410 0$aSecurity and Cryptology ;$v8441 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer security. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 676 $a005.82 702 $aNguyen$b Phong Q$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOswald$b Elisabeth$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996203611203316 996 $aAdvances in Cryptology ? EUROCRYPT 2014$92805693 997 $aUNISA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress