000 | 03293nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-642-36594-2 | ||
003 | DE-He213 | ||
005 | 20240730193344.0 | ||
007 | cr nn 008mamaa | ||
008 | 130217s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642365942 _9978-3-642-36594-2 |
||
024 | 7 |
_a10.1007/978-3-642-36594-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTheory of Cryptography _h[electronic resource] : _b10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings / _cedited by Amit Sahai. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXII, 726 p. 34 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7785 |
|
505 | 0 | _aStudy of known paradigms -- Approaches, and techniques, directed towards their better understanding and utilization -- Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones -- Formulation and treatment of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography. | |
520 | _aThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aTheory of Computation. _9153389 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aSahai, Amit. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9153390 |
|
710 | 2 |
_aSpringerLink (Online service) _9153391 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642365935 |
776 | 0 | 8 |
_iPrinted edition: _z9783642365959 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7785 _9153392 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-36594-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94718 _d94718 |