000 | 03182nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-031-07085-3 | ||
003 | DE-He213 | ||
005 | 20240730173315.0 | ||
007 | cr nn 008mamaa | ||
008 | 220528s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031070853 _9978-3-031-07085-3 |
||
024 | 7 |
_a10.1007/978-3-031-07085-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - EUROCRYPT 2022 _h[electronic resource] : _b41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II / _cedited by Orr Dunkelman, Stefan Dziembowski. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXVII, 909 p. 130 illus., 27 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13276 |
|
520 | _aThe 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9107842 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9107843 |
650 | 2 | 4 |
_aComputer Communication Networks. _9107844 |
650 | 2 | 4 |
_aCoding and Information Theory. _9107845 |
700 | 1 |
_aDunkelman, Orr. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107846 |
|
700 | 1 |
_aDziembowski, Stefan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9107847 |
|
710 | 2 |
_aSpringerLink (Online service) _9107848 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031070846 |
776 | 0 | 8 |
_iPrinted edition: _z9783031070860 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13276 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-07085-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88860 _d88860 |