LEADER 03761nam 22007815 450 001 996465913803316 005 20200701203524.0 010 $a3-642-19571-7 024 7 $a10.1007/978-3-642-19571-6 035 $a(CKB)2670000000076045 035 $a(SSID)ssj0000530587 035 $a(PQKBManifestationID)11351548 035 $a(PQKBTitleCode)TC0000530587 035 $a(PQKBWorkID)10569103 035 $a(PQKB)11649202 035 $a(DE-He213)978-3-642-19571-6 035 $a(MiAaPQ)EBC3066589 035 $a(PPN)151589690 035 $a(EXLCZ)992670000000076045 100 $a20110322d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography$b[electronic resource] $e8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011, Proceedings /$fedited by Yuval Ishai 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XII, 631 p.) 225 1 $aSecurity and Cryptology ;$v6597 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-19570-9 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations. 410 0$aSecurity and Cryptology ;$v6597 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aMath Applications in Computer Science. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.82 702 $aIshai$b Yuval$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Association for Cryptologic Research. 906 $aBOOK 912 $a996465913803316 996 $aTheory of Cryptography$9772206 997 $aUNISA