LEADER 04142nam 22007095 450 001 996418213003316 005 20200705054239.0 010 $a3-030-45388-X 024 7 $a10.1007/978-3-030-45388-6 035 $a(CKB)4100000011223246 035 $a(MiAaPQ)EBC6303550 035 $a(DE-He213)978-3-030-45388-6 035 $a(PPN)243761090 035 $a(EXLCZ)994100000011223246 100 $a20200411d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPublic-Key Cryptography ? PKC 2020$b[electronic resource] $e23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4?7, 2020, Proceedings, Part II /$fedited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (666 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v12111 311 $a3-030-45387-1 320 $aIncludes bibliographical references and index. 327 $aFunctional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes. 330 $aThe two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes. 410 0$aSecurity and Cryptology ;$v12111 606 $aComputer organization 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aComputers 606 $aComputer communication systems 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer organization. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers. 615 0$aComputer communication systems. 615 14$aComputer Systems Organization and Communication Networks. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 676 $a005.824 702 $aKiayias$b Aggelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKohlweiss$b Markulf$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWallden$b Petros$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZikas$b Vassilis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418213003316 996 $aPublic-Key Cryptography ? PKC 2020$92007081 997 $aUNISA