|
|
|
|
LEADER |
03799nam a2200589 4500 |
001 |
978-3-030-34621-8 |
003 |
DE-He213 |
005 |
20191109223727.0 |
007 |
cr nn 008mamaa |
008 |
191109s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030346218
|9 978-3-030-34621-8
|
024 |
7 |
|
|a 10.1007/978-3-030-34621-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Advances in Cryptology - ASIACRYPT 2019
|h [electronic resource] :
|b 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II /
|c edited by Steven D. Galbraith, Shiho Moriai.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XV, 669 p. 249 illus., 28 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11922
|
505 |
0 |
|
|a Lattices -- Symmetric Cryptography -- Isogenies -- Obfuscation -- Multiparty Computation -- Quantum -- E-cash and Blockchain -- Codes -- Authenticated Encryption -- Multilinear Maps -- Homomorphic Encryption -- Combinatorial Cryptography -- Signatures -- Public Key Encryption -- Side Channels -- Functional Encryption -- Zero Knowledge.
|
520 |
|
|
|a The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data mining.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I24067
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 http://scigraph.springernature.com/things/product-market-codes/I18030
|
700 |
1 |
|
|a Galbraith, Steven D.
|e editor.
|0 (orcid)0000-0001-7114-8377
|1 https://orcid.org/0000-0001-7114-8377
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Moriai, Shiho.
|e editor.
|0 (orcid)0000-0002-6072-6183
|1 https://orcid.org/0000-0002-6072-6183
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030346201
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030346225
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11922
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-34621-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|