Loading…

Advances in cryptology - CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings. Part II /

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 s...

Full description

Saved in:
Bibliographic Details
Corporate Authors: CRYPTO (Conference) Santa Barbara, Calif.), SpringerLink (Online service)
Other Authors: Shacham, Hovav (Editor), Boldyreva, Alexandra (Editor)
Format: Conference Proceeding eBook
Language:English
Published: Cham : Springer, 2018.
Series:Lecture notes in computer science ; 10992.
LNCS sublibrary. Security and cryptology.
Physical Description:
1 online resource (XV, 833 pages).
Subjects:
Online Access:SpringerLink - Click here for access

MARC

LEADER 00000cam a2200000Mi 4500
001 on1049850066
003 OCoLC
005 20240223121953.0
006 m o d
007 cr nn||||mamaa
008 180723s2018 sz o 100 0 eng d
015 |a GBB902085  |2 bnb 
016 7 |a 019192316  |2 Uk 
019 |a 1048595876  |a 1054305177  |a 1055049572  |a 1075577550  |a 1081081494  |a 1082334533  |a 1084544064  |a 1086460544  |a 1088977860  |a 1116077305  |a 1122815784  |a 1125741071  |a 1136385802  |a 1138678970  |a 1144250559 
020 |a 9783319968810 
020 |a 3319968815 
020 |a 3319968807 
020 |a 9783319968803 
020 |a 9783319968827  |q (print) 
020 |a 3319968823 
020 |z 9783319968803 
024 7 |a 10.1007/978-3-319-96881-0  |2 doi 
035 |a (OCoLC)1049850066  |z (OCoLC)1048595876  |z (OCoLC)1054305177  |z (OCoLC)1055049572  |z (OCoLC)1075577550  |z (OCoLC)1081081494  |z (OCoLC)1082334533  |z (OCoLC)1084544064  |z (OCoLC)1086460544  |z (OCoLC)1088977860  |z (OCoLC)1116077305  |z (OCoLC)1122815784  |z (OCoLC)1125741071  |z (OCoLC)1136385802  |z (OCoLC)1138678970  |z (OCoLC)1144250559 
037 |a com.springer.onix.9783319968810  |b Springer Nature 
040 |a UCW  |b eng  |e rda  |e pn  |c UCW  |d OCLCO  |d GW5XE  |d UAB  |d OCLCF  |d MERUC  |d OH1  |d OCLCO  |d OCLCQ  |d OTZ  |d LVT  |d U3W  |d VT2  |d DKU  |d UKMGB  |d CAUOI  |d BRX  |d LEAUB  |d MERER  |d OCLCQ  |d CEF  |d YDXIT  |d S2H  |d LEATE  |d EBLCP  |d OCLCQ  |d OCL  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.82  |2 23 
111 2 |a CRYPTO (Conference)  |n (38th :  |d 2018 :  |c Santa Barbara, Calif.)  |0 https://id.loc.gov/authorities/names/nb2018016852. 
245 1 0 |a Advances in cryptology - CRYPTO 2018 :  |b 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings.  |n Part II /  |c edited by Hovav Shacham, Alexandra Boldyreva. 
264 1 |a Cham :  |b Springer,  |c 2018. 
300 |a 1 online resource (XV, 833 pages). 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 10992. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
505 0 |a Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 
520 |a The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008102033. 
650 0 |a Computer security  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008101458. 
650 6 |a Chiffrement (Informatique)  |v Congrès. 
650 6 |a Sécurité informatique  |v Congrès. 
650 7 |a Software Engineering.  |2 bicssc. 
650 7 |a Computer networking & communications.  |2 bicssc. 
650 7 |a Artificial intelligence.  |2 bicssc. 
650 7 |a Coding theory & cryptology.  |2 bicssc. 
650 7 |a Computers  |x Software Development & Engineering  |x General.  |2 bisacsh. 
650 7 |a Computers  |x Data Transmission Systems  |x Electronic Data Interchange.  |2 bisacsh. 
650 7 |a Computers  |x Intelligence (AI) & Semantics.  |2 bisacsh. 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Artificial intelligence.  |2 fast. 
650 7 |a Computer input-output equipment.  |2 fast. 
650 7 |a Computer science.  |2 fast. 
650 7 |a Data encryption (Computer science)  |2 fast. 
650 7 |a Software engineering.  |2 fast. 
655 2 |a Congress.  |0 https://id.nlm.nih.gov/mesh/D016423. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft  |0 https://id.loc.gov/authorities/genreForms/gf2014026068. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Shacham, Hovav,  |0 https://id.loc.gov/authorities/names/nb2009019508  |e editor. 
700 1 |a Boldyreva, Alexandra,  |0 https://id.loc.gov/authorities/names/nb2018016851  |e editor. 
710 2 |a SpringerLink (Online service)  |0 https://id.loc.gov/authorities/names/no2005046756. 
776 0 8 |i Printed edition:  |z 9783319968803. 
830 0 |a Lecture notes in computer science ;  |0 https://id.loc.gov/authorities/names/n42015162  |v 10992.  |x 0302-9743. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 https://id.loc.gov/authorities/names/no2007042442. 
907 |a .b58068193  |b multi  |c -  |d 181002  |e 240321 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Overnight, in 2023.01 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Q3&4 2018 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.01 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.10 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150588938  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-96881-0  |3 SpringerLink  |z Click here for access