LEADER 03743nam 22007815 450 001 996466253503316 005 20200702222454.0 010 $a3-642-28914-2 024 7 $a10.1007/978-3-642-28914-9 035 $a(CKB)3360000000365954 035 $a(SSID)ssj0000666390 035 $a(PQKBManifestationID)11476785 035 $a(PQKBTitleCode)TC0000666390 035 $a(PQKBWorkID)10664141 035 $a(PQKB)11650272 035 $a(DE-He213)978-3-642-28914-9 035 $a(MiAaPQ)EBC3070257 035 $a(PPN)168313189 035 $a(EXLCZ)993360000000365954 100 $a20120305d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography$b[electronic resource] $e9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /$fedited by Ronald Cramer 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (672 p. 6 illus.) 225 1 $aSecurity and Cryptology ;$v7194 300 $aInternational conference proceedings. 311 $a3-642-28913-4 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. 410 0$aSecurity and Cryptology ;$v7194 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aMath Applications in Computer Science. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.82 702 $aCramer$b Ronald$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTheory of Cryptography Conference 906 $aBOOK 912 $a996466253503316 996 $aTheory of Cryptography$9772206 997 $aUNISA