LEADER 04117nam 22008175 450 001 996466444803316 005 20200704061554.0 010 $a3-319-70700-0 024 7 $a10.1007/978-3-319-70700-6 035 $a(CKB)4340000000223553 035 $a(DE-He213)978-3-319-70700-6 035 $a(MiAaPQ)EBC6283484 035 $a(MiAaPQ)EBC5594783 035 $a(Au-PeEL)EBL5594783 035 $a(OCoLC)1013928138 035 $a(PPN)221251669 035 $a(EXLCZ)994340000000223553 100 $a20171117d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2017$b[electronic resource] $e23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III /$fedited by Tsuyoshi Takagi, Thomas Peyrin 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 473 p. 57 illus.) 225 1 $aSecurity and Cryptology ;$v10626 300 $aIncludes index. 311 $a3-319-70699-3 327 $aCryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs. 330 $aThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs. 410 0$aSecurity and Cryptology ;$v10626 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aManagement information systems 606 $aComputer science 606 $aComputers 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$aManagement of Computing and Information Systems. 615 24$aTheory of Computation. 615 24$aMathematics of Computing. 676 $a005.82 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPeyrin$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466444803316 996 $aAdvances in Cryptology ? ASIACRYPT 2017$92808718 997 $aUNISA