Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/810
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shacham, Hovav. ; | en_US |
dc.contributor.author | Boldyreva, Alexandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:18Z | - |
dc.date.available | 2020-05-17T08:22:18Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319968810 ; | en_US |
dc.identifier.isbn | 9783319968803 (print) ; | en_US |
dc.identifier.isbn | 9783319968827 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/810 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319968803. ; | en_US |
dc.description | Printed edition: ; 9783319968827. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ; | en_US |
dc.description.statementofresponsibility | edited by Hovav Shacham, Alexandra Boldyreva. | en_US |
dc.description.tableofcontents | Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ; | en_US |
dc.format.extent | XV, 833 p. 113 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.haspart | 9783319968803.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Data transmission systems. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Input/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Advances in Cryptology ee CRYPTO 2018 | en_US |
dc.title.alternative | 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319968803.pdf | 23.54 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shacham, Hovav. ; | en_US |
dc.contributor.author | Boldyreva, Alexandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:18Z | - |
dc.date.available | 2020-05-17T08:22:18Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319968810 ; | en_US |
dc.identifier.isbn | 9783319968803 (print) ; | en_US |
dc.identifier.isbn | 9783319968827 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/810 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319968803. ; | en_US |
dc.description | Printed edition: ; 9783319968827. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ; | en_US |
dc.description.statementofresponsibility | edited by Hovav Shacham, Alexandra Boldyreva. | en_US |
dc.description.tableofcontents | Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ; | en_US |
dc.format.extent | XV, 833 p. 113 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.haspart | 9783319968803.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Data transmission systems. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Input/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Advances in Cryptology ee CRYPTO 2018 | en_US |
dc.title.alternative | 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319968803.pdf | 23.54 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shacham, Hovav. ; | en_US |
dc.contributor.author | Boldyreva, Alexandra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:18Z | - |
dc.date.available | 2020-05-17T08:22:18Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319968810 ; | en_US |
dc.identifier.isbn | 9783319968803 (print) ; | en_US |
dc.identifier.isbn | 9783319968827 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/810 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319968803. ; | en_US |
dc.description | Printed edition: ; 9783319968827. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. ; | en_US |
dc.description.statementofresponsibility | edited by Hovav Shacham, Alexandra Boldyreva. | en_US |
dc.description.tableofcontents | Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. ; | en_US |
dc.format.extent | XV, 833 p. 113 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 10992. ; | en_US |
dc.relation.haspart | 9783319968803.pdf | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Data transmission systems. ; | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Software Engineering/Programming and Operating Systems. ; http://scigraph.springernature.com/things/product-market-codes/I14002. ; | en_US |
dc.subject | Input/Output and Data Communications. ; http://scigraph.springernature.com/things/product-market-codes/I12042. ; | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.subject.ddc | 005.82 ; 23 ; | en_US |
dc.title | Advances in Cryptology ee CRYPTO 2018 | en_US |
dc.title.alternative | 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19ee23, 2018, Proceedings, Part II / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319968803.pdf | 23.54 MB | Adobe PDF | Preview File |