It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:178553125:2863
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:178553125:2863?format=raw

LEADER: 02863nam a22004935a 4500
001 014131685-3
005 20140905184946.0
008 140714s2014 gw | s ||0| 0|eng d
020 $a9783662443811
020 $a9783662443811
020 $a9783662443804
024 7 $a10.1007/978-3-662-44381-1$2doi
035 $a(Springer)9783662443811
040 $aSpringer
050 4 $aQA76.9.A25
072 7 $aURY$2bicssc
072 7 $aCOM053000$2bisacsh
082 04 $a005.82$223
100 1 $aGaray, Juan A.,$eeditor.
245 10 $aAdvances in Cryptology – CRYPTO 2014 :$b34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II /$cedited by Juan A. Garay, Rosario Gennaro.
264 1 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg :$bImprint: Springer,$c2014.
300 $aXVIII, 532 p. 53 illus.$bonline resource.
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
490 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v8617
505 0 $aQuantum Cryptography -- Foundations of Hardness -- Obfuscation.- Number-Theoretic Hardness -- Side Channels and Leakage Resilience -- Information-Theoretic Security -- Key Exchange and Secure Communication -- Zero Knowledge -- Composable Security -- Secure Computation – Foundations -- Secure Computation – Implementations.
520 $aThe two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
650 10 $aComputer science.
650 0 $aData encryption (Computer science)
650 0 $aComputer science.
650 0 $aData protection.
650 0 $aComputer software.
650 0 $aComputational complexity.
650 24 $aData Encryption.
650 24 $aSystems and Data Security.
650 24 $aAlgorithm Analysis and Problem Complexity.
650 24 $aDiscrete Mathematics in Computer Science.
700 1 $aGennaro, Rosario,$eeditor.
776 08 $iPrinted edition:$z9783662443804
830 0 $aLecture Notes in Computer Science ;$v8617.
988 $a20140802
906 $0VEN