Public-key cryptography -- PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings. Part I /
The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 s...
Corporate Authors: | International Workshop on Practice and Theory in Public Key Cryptography Taipei, Taiwan) |
---|---|
Other Authors: | International Workshop on Practice and Theory in Public Key Cryptography, Cheng, Chen-Mou (Computer scientist), Chung, Kai-Min,, Persiano, Giuseppe,, Yang, Bo-Yin,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin :
Springer,
2016.
|
Physical Description: |
1 online resource (xiv, 472 pages) : illustrations. |
Series: |
Lecture notes in computer science ;
9614. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 06678cam a2201033Ii 4500 | ||
---|---|---|---|
001 | 940546637 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 160223s2016 gw a o 101 0 eng d | ||
019 | |a 963338208 |a 1005792715 |a 1011994277 |a 1048141603 |a 1049849122 |a 1058384703 |a 1066567115 |a 1081197515 |a 1086548623 |a 1096645326 |a 1112597131 |a 1113110279 |a 1116074534 |a 1119469707 |a 1122811894 |a 1127224018 |a 1136439930 | ||
020 | |a 9783662493847 |q (electronic bk.) | ||
020 | |a 3662493845 |q (electronic bk.) | ||
020 | |a 3662493837 | ||
020 | |a 9783662493830 | ||
020 | |z 9783662493830 | ||
024 | 7 | |a 10.1007/978-3-662-49384-7 |2 doi | |
035 | |a (OCoLC)940546637 |z (OCoLC)963338208 |z (OCoLC)1005792715 |z (OCoLC)1011994277 |z (OCoLC)1048141603 |z (OCoLC)1049849122 |z (OCoLC)1058384703 |z (OCoLC)1066567115 |z (OCoLC)1081197515 |z (OCoLC)1086548623 |z (OCoLC)1096645326 |z (OCoLC)1112597131 |z (OCoLC)1113110279 |z (OCoLC)1116074534 |z (OCoLC)1119469707 |z (OCoLC)1122811894 |z (OCoLC)1127224018 |z (OCoLC)1136439930 | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d AZU |d YDXCP |d OCLCF |d KSU |d OHI |d COO |d IAD |d JBG |d ICW |d Z5A |d ILO |d ICN |d ESU |d VT2 |d IOG |d U3W |d BUF |d OCLCQ |d JG0 |d UCW |d TFW |d OCLCQ |d AU@ |d OCLCQ |d WYU |d LEAUB |d OCLCQ |d ERF |d UKBTH |d LEATE |d AJS |d OCLCQ |d OCLCO |d COM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 |b I58 2016eb | |
072 | 7 | |a URY |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8/2 |2 23 |
111 | 2 | |a International Workshop on Practice and Theory in Public Key Cryptography |n (19th : |d 2016 : |c Taipei, Taiwan) | |
245 | 1 | 0 | |a Public-key cryptography -- PKC 2016 : |b 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings. |n Part I / |c Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.). |
246 | 3 | |a PKC 2016. | |
264 | 1 | |a Berlin : |b Springer, |c 2016. | |
300 | |a 1 online resource (xiv, 472 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 9614. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
500 | |a International conference proceedings. | ||
500 | |a Includes author index. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed February 23, 2016). | |
505 | 0 | |a Trading Plaintext-Awareness for Simulatability to Achieve Chosen Cipher Text Security -- Chosen-Cipher Text Security from Subset Sum -- mso-fareast-theme-font: minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal -- CA-Secure Keyed-Fully Homomorphic Encryption -- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions -- Extended Nested Dual System Groups, Revisited -- Functional Encryption for Inner Product with Full Function Privacy -- Deniable Functional Encryption -- Identity-Based Cryptosystems and Quadratic Residuosity -- Identity-based Hierarchical Key-insulated Encryption without Random Oracles -- Attribute-Based Signatures for Circuits from Bilinear Map -- Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys -- Fault-Tolerant Aggregate Signatures -- Delegatable Functional Signatures -- Mitigating Multi-Target Attacks in Hash-based Signatures -- Nearly Optimal Verifiable Data Streaming -- ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM. | |
520 | |a The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives. | ||
546 | |a English. | ||
650 | 0 | |a Public key cryptography |v Congresses. | |
650 | 6 | |a Cryptographie à clé publique |v Congrès. | |
650 | 7 | |a Public key cryptography. |2 fast. | |
655 | 2 | |a Congress. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
700 | 1 | |a Cheng, Chen-Mou |c (Computer scientist) |1 https://id.oclc.org/worldcat/entity/E39PCjvkBq78WkCbx6CGMDg6PP, |e editor. | |
700 | 1 | |a Chung, Kai-Min, |e editor. | |
700 | 1 | |a Persiano, Giuseppe, |e editor. | |
700 | 1 | |a Yang, Bo-Yin, |e editor. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Printed edition: |z 9783662493830. |
830 | 0 | |a Lecture notes in computer science ; |v 9614. |x 0302-9743. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b5028437x |b multi |c - |d 160404 |e 240401 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g gw |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2023.01 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.12 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE Comp, 2017.10 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
933 | |a Marcive found issue: "700 1 |a Chung, Kai-Min, |e editor." | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.01 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.12 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.09 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a OCLC offline update by CMU | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2024.03 | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150452792 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-662-49384-7 |3 SpringerLink |z Click here for access |