LEADER 04340nam 22008175 450 001 996465396203316 005 20230718233036.0 010 $a3-642-30057-X 024 7 $a10.1007/978-3-642-30057-8 035 $a(CKB)3400000000085277 035 $a(SSID)ssj0000697598 035 $a(PQKBManifestationID)11426632 035 $a(PQKBTitleCode)TC0000697598 035 $a(PQKBWorkID)10691566 035 $a(PQKB)10991341 035 $a(DE-He213)978-3-642-30057-8 035 $a(MiAaPQ)EBC3071026 035 $a(PPN)168315831 035 $a(EXLCZ)993400000000085277 100 $a20120518d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Cryptography -- PKC 2012$b[electronic resource] $e15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings /$fedited by Marc Fischlin, Johannes Buchmann, Mark Manulis 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 734 p. 63 illus.) 225 1 $aSecurity and Cryptology ;$v7293 300 $aInternational conference proceedings. 311 $a3-642-30056-1 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes. 410 0$aSecurity and Cryptology ;$v7293 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 608 $aConference proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aFischlin$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBuchmann$b Johannes$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aManulis$b Mark$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Practice and Theory in Public Key Cryptography 906 $aBOOK 912 $a996465396203316 996 $aPublic Key Cryptography -- PKC 2012$92830278 997 $aUNISA