Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/810
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShacham, Hovav. ;en_US
dc.contributor.authorBoldyreva, Alexandra. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:18Z-
dc.date.available2020-05-17T08:22:18Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319968810 ;en_US
dc.identifier.isbn9783319968803 (print) ;en_US
dc.identifier.isbn9783319968827 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/810-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319968803. ;en_US
dc.descriptionPrinted edition: ; 9783319968827. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ;en_US
dc.description.statementofresponsibilityedited by Hovav Shacham, Alexandra Boldyreva.en_US
dc.description.tableofcontentsSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ;en_US
dc.format.extentXV, 833 p. 113 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.haspart9783319968803.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectData transmission systems. ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectInput/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleAdvances in Cryptology ee CRYPTO 2018en_US
dc.title.alternative38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319968803.pdf23.54 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShacham, Hovav. ;en_US
dc.contributor.authorBoldyreva, Alexandra. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:18Z-
dc.date.available2020-05-17T08:22:18Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319968810 ;en_US
dc.identifier.isbn9783319968803 (print) ;en_US
dc.identifier.isbn9783319968827 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/810-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319968803. ;en_US
dc.descriptionPrinted edition: ; 9783319968827. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ;en_US
dc.description.statementofresponsibilityedited by Hovav Shacham, Alexandra Boldyreva.en_US
dc.description.tableofcontentsSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ;en_US
dc.format.extentXV, 833 p. 113 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.haspart9783319968803.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectData transmission systems. ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectInput/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleAdvances in Cryptology ee CRYPTO 2018en_US
dc.title.alternative38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319968803.pdf23.54 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShacham, Hovav. ;en_US
dc.contributor.authorBoldyreva, Alexandra. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:18Z-
dc.date.available2020-05-17T08:22:18Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319968810 ;en_US
dc.identifier.isbn9783319968803 (print) ;en_US
dc.identifier.isbn9783319968827 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/810-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319968803. ;en_US
dc.descriptionPrinted edition: ; 9783319968827. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ;en_US
dc.description.statementofresponsibilityedited by Hovav Shacham, Alexandra Boldyreva.en_US
dc.description.tableofcontentsSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ;en_US
dc.format.extentXV, 833 p. 113 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 10992. ;en_US
dc.relation.haspart9783319968803.pdfen_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectSoftware Engineeringen_US
dc.subjectData transmission systems. ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ;en_US
dc.subjectInput/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleAdvances in Cryptology ee CRYPTO 2018en_US
dc.title.alternative38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319968803.pdf23.54 MBAdobe PDFThumbnail
Preview File