000 03216nam a22005655i 4500
001 978-3-662-44381-1
003 DE-He213
005 20160615105842.0
007 cr nn 008mamaa
008 140714s2014 gw | s |||| 0|eng d
020 _a9783662443811
_9978-3-662-44381-1
024 7 _a10.1007/978-3-662-44381-1
_2doi
049 _aAlfaisal Main Library
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aAdvances in Cryptology – CRYPTO 2014
_h[electronic resource] :
_b34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II /
_cedited by Juan A. Garay, Rosario Gennaro.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXVIII, 532 p. 53 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8617
505 0 _aQuantum Cryptography -- Foundations of Hardness -- Obfuscation.- Number-Theoretic Hardness -- Side Channels and Leakage Resilience -- Information-Theoretic Security -- Key Exchange and Secure Communication -- Zero Knowledge -- Composable Security -- Secure Computation – Foundations -- Secure Computation – Implementations.
520 _aThe two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aAlgorithms.
650 0 _aComputer science
_xMathematics.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aSystems and Data Security.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aDiscrete Mathematics in Computer Science.
655 7 _aElectronic books.
_2local
700 1 _aGaray, Juan A.
_eeditor.
700 1 _aGennaro, Rosario.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783662443804
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8617
856 4 0 _uhttp://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-662-44381-1
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _2lcc
_cEBOOKS
999 _c273685
_d273685