LEADER 03573nam 22007935 450 001 996466227103316 005 20200701022827.0 010 $a3-319-27239-X 024 7 $a10.1007/978-3-319-27239-9 035 $a(CKB)4340000000001242 035 $a(SSID)ssj0001599531 035 $a(PQKBManifestationID)16305811 035 $a(PQKBTitleCode)TC0001599531 035 $a(PQKBWorkID)14892239 035 $a(PQKB)11368348 035 $a(DE-He213)978-3-319-27239-9 035 $a(MiAaPQ)EBC6299245 035 $a(MiAaPQ)EBC5595332 035 $a(Au-PeEL)EBL5595332 035 $a(OCoLC)933755587 035 $a(PPN)190884711 035 $a(EXLCZ)994340000000001242 100 $a20151207d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography and Coding$b[electronic resource] $e15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings /$fedited by Jens Groth 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 329 p. 42 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9496 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-27238-1 327 $aAuthentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience. 330 $aThis book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience. 410 0$aSecurity and Cryptology ;$v9496 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aComputer security 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aGroth$b Jens$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466227103316 996 $aCryptography and Coding$9772174 997 $aUNISA