|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-55220-5 |
003 |
DE-He213 |
005 |
20220115063045.0 |
007 |
cr nn 008mamaa |
008 |
140430s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642552205
|9 978-3-642-55220-5
|
024 |
7 |
|
|a 10.1007/978-3-642-55220-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Advances in Cryptology - EUROCRYPT 2014
|h [electronic resource] :
|b 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings /
|c edited by Phong Q. Nguyen, Elisabeth Oswald.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIV, 714 p. 77 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8441
|
505 |
0 |
|
|a Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing -- Secret-key analysis and implementations -- Obfuscation and multi linear maps -- Authenticated encryption -- Symmetric encryption -- Multi-party encryption -- Side-channel attacks -- Signatures and public-key encryption -- Functional encryption -- Foundations -- Multi-party computation.
|
520 |
|
|
|a This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Nguyen, Phong Q.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Oswald, Elisabeth.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642552212
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642552199
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8441
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-55220-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|