LEADER 03903nam 22007095 450 001 996465959203316 005 20200706032741.0 010 $a3-642-40084-1 024 7 $a10.1007/978-3-642-40084-1 035 $a(CKB)3710000000015892 035 $a(SSID)ssj0000988019 035 $a(PQKBManifestationID)11621027 035 $a(PQKBTitleCode)TC0000988019 035 $a(PQKBWorkID)10948295 035 $a(PQKB)10655059 035 $a(DE-He213)978-3-642-40084-1 035 $a(MiAaPQ)EBC3093058 035 $a(PPN)172428947 035 $a(EXLCZ)993710000000015892 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology ? CRYPTO 2013$b[electronic resource] $e33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II /$fedited by Ran Canetti, Juan A. Garay 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVIII, 558 p. 31 illus.) 225 1 $aSecurity and Cryptology ;$v8043 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40083-3 327 $aImplementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption. 330 $aThe two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption. 410 0$aSecurity and Cryptology ;$v8043 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Science, general. 676 $a005.82 702 $aCanetti$b Ran$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaray$b Juan A$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465959203316 996 $aAdvances in Cryptology ? CRYPTO 2013$92830070 997 $aUNISA