|
|
|
|
LEADER |
02333nmm a2200337 u 4500 |
001 |
EB000739047 |
003 |
EBX01000000000000000590479 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140505 ||| eng |
020 |
|
|
|a 9783642552205
|
100 |
1 |
|
|a Nguyen, Phong Q.
|e [editor]
|
245 |
0 |
0 |
|a Advances in Cryptology – EUROCRYPT 2014
|h Elektronische Ressource
|b 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
|c edited by Phong Q. Nguyen, Elisabeth Oswald
|
250 |
|
|
|a 1st ed. 2014
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2014, 2014
|
300 |
|
|
|a XIV, 714 p. 77 illus
|b online resource
|
505 |
0 |
|
|a Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing -- Secret-key analysis and implementations -- Obfuscation and multi linear maps -- Authenticated encryption -- Symmetric encryption -- Multi-party encryption -- Side-channel attacks -- Signatures and public-key encryption -- Functional encryption -- Foundations -- Multi-party computation
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Oswald, Elisabeth
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-55220-5
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-55220-5?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation
|