000 | 03896nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-90456-2 | ||
003 | DE-He213 | ||
005 | 20240730180652.0 | ||
007 | cr nn 008mamaa | ||
008 | 211104s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030904562 _9978-3-030-90456-2 |
||
024 | 7 |
_a10.1007/978-3-030-90456-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTheory of Cryptography _h[electronic resource] : _b19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III / _cedited by Kobbi Nissim, Brent Waters. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXII, 515 p. 41 illus., 15 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13044 |
|
505 | 0 | _aCovert Learning: How to Learn with an Untrusted Intermediary -- Random-Index PIR and Applications -- Forward Secret Encrypted RAM: Lower Bounds and Applications -- Laconic Private Set Intersection and Applications -- Amortizing Rate-1 OT and Applications to PIR and PSI -- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security -- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption -- Grafting Key Trees: Efficient Key Management for Overlapping Groups -- Updatable Public Key Encryption in the Standard Model -- Towards Tight Adaptive Security of Non-Interactive Key Exchange -- On the Impossibility of Purely Algebraic Signatures -- Policy-Compliant Signatures -- Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions -- Non-Malleable Vector Commitments via Local Equivocability -- Non-Malleable Time-Lock Puzzles and Applications -- Vector and Functional Commitments from Lattices.-. | |
520 | _aThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aApplication software. _9121281 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aCoding and Information Theory. _9121282 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9121283 |
650 | 2 | 4 |
_aComputer Communication Networks. _9121284 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aNissim, Kobbi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121285 |
|
700 | 1 |
_aWaters, Brent. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121286 |
|
710 | 2 |
_aSpringerLink (Online service) _9121287 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030904555 |
776 | 0 | 8 |
_iPrinted edition: _z9783030904579 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13044 _9121288 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-90456-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90441 _d90441 |