LEADER 04579nam 22007575 450 001 996466212503316 005 20200703052217.0 010 $a3-030-17656-8 024 7 $a10.1007/978-3-030-17656-3 035 $a(CKB)4100000008160579 035 $a(DE-He213)978-3-030-17656-3 035 $a(MiAaPQ)EBC5923401 035 $a(PPN)236521918 035 $a(EXLCZ)994100000008160579 100 $a20190424d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2019$b[electronic resource] $e38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19?23, 2019, Proceedings, Part II /$fedited by Yuval Ishai, Vincent Rijmen 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIX, 779 p. 961 illus., 40 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11477 311 $a3-030-17655-X 320 $aIncludes bibliographical references and index. 327 $aABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus -- Homomorphic primitives -- Standards -- Searchable encryption and ORAM -- Proofs of work and space -- Secure computation -- Quantum, secure computation and NIZK, Lattice-based cryptography -- Foundations -- Efficient secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis. 330 $aThe three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis. 410 0$aSecurity and Cryptology ;$v11477 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aCoding theory 606 $aInformation theory 606 $aComputers and civilization 606 $aData mining 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputers and civilization. 615 0$aData mining. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aCoding and Information Theory. 615 24$aComputers and Society. 615 24$aData Mining and Knowledge Discovery. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aIshai$b Yuval$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRijmen$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466212503316 996 $aAdvances in Cryptology ? EUROCRYPT 2019$92495420 997 $aUNISA