LEADER 04581nam 22007575 450 001 996466213003316 005 20200702012758.0 010 $a3-030-17653-3 024 7 $a10.1007/978-3-030-17653-2 035 $a(CKB)4100000008160578 035 $a(DE-He213)978-3-030-17653-2 035 $a(MiAaPQ)EBC5919501 035 $a(PPN)23652190X 035 $a(EXLCZ)994100000008160578 100 $a20190418d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2019$b[electronic resource] $e38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19?23, 2019, Proceedings, Part I /$fedited by Yuval Ishai, Vincent Rijmen 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XXVII, 753 p. 917 illus., 37 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11476 311 $a3-030-17652-5 320 $aIncludes bibliographical references and index. 327 $aABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers -- Differential privacy -- Bounds for symmetric cryptography -- Non-malleability -- Blockchain and consensus -- Homomorphic primitives -- Standards -- Searchable encryption and ORAM -- Proofs of work and space -- Secure computation -- Quantum, secure computation and NIZK, Lattice-based cryptography -- Foundations -- Efficient secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis. 330 $aThe three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis. 410 0$aSecurity and Cryptology ;$v11476 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aSoftware engineering 606 $aComputers and civilization 606 $aData mining 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aSoftware engineering. 615 0$aComputers and civilization. 615 0$aData mining. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aComputers and Society. 615 24$aData Mining and Knowledge Discovery. 615 24$aArtificial Intelligence. 676 $a005.82 702 $aIshai$b Yuval$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRijmen$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466213003316 996 $aAdvances in Cryptology ? EUROCRYPT 2019$92495420 997 $aUNISA