LEADER 03661nam 22007575 450 001 996466002103316 005 20200630174244.0 010 $a3-319-31301-0 024 7 $a10.1007/978-3-319-31301-6 035 $a(CKB)3710000000627359 035 $a(SSID)ssj0001660745 035 $a(PQKBManifestationID)16439688 035 $a(PQKBTitleCode)TC0001660745 035 $a(PQKBWorkID)14987122 035 $a(PQKB)11543076 035 $a(DE-He213)978-3-319-31301-6 035 $a(MiAaPQ)EBC5595320 035 $a(PPN)192771930 035 $a(EXLCZ)993710000000627359 100 $a20160330d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography - SAC 2015$b[electronic resource] $e22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers /$fedited by Orr Dunkelman, Liam Keliher 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIX, 528 p. 117 illus.) 225 1 $aSecurity and Cryptology ;$v9566 300 $aIncludes index. 311 $a3-319-31300-2 330 $aThis book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes. 410 0$aSecurity and Cryptology ;$v9566 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aDunkelman$b Orr$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKeliher$b Liam$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466002103316 996 $aSelected Areas in Cryptography - SAC 2015$92589396 997 $aUNISA