001374388 000__ 04050cam\a2200601Ii\4500 001374388 001__ 1374388 001374388 003__ OCoLC 001374388 005__ 20230306152951.0 001374388 006__ m\\\\\o\\d\\\\\\\\ 001374388 007__ cr\cn\nnnunnun 001374388 008__ 161122s2016\\\\gw\a\\\\o\\\\\101\0\eng\d 001374388 019__ $$a965140899$$a967714950$$a971084341$$a981114770$$a1005825403$$a1011951441$$a1048187286$$a1049850616$$a1058935249$$a1066674016$$a1081247652$$a1086543719$$a1112525744 001374388 020__ $$a9783662538906$$q(electronic bk.) 001374388 020__ $$a3662538903$$q(electronic bk.) 001374388 020__ $$a366253889X 001374388 020__ $$a9783662538890 001374388 020__ $$z9783662538890$$q(print) 001374388 0247_ $$a10.1007/978-3-662-53890-6$$2doi 001374388 035__ $$aSP(OCoLC)963936344$$z(OCoLC)965140899$$z(OCoLC)967714950$$z(OCoLC)971084341$$z(OCoLC)981114770$$z(OCoLC)1005825403$$z(OCoLC)1011951441$$z(OCoLC)1048187286$$z(OCoLC)1049850616$$z(OCoLC)1058935249$$z(OCoLC)1066674016$$z(OCoLC)1081247652$$z(OCoLC)1086543719$$z(OCoLC)1112525744 001374388 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDX$$dNJR$$dUPM$$dSTF$$dOCLCF$$dESU$$dVT2$$dOCLCQ$$dIOG$$dEQO$$dOTZ$$dIAD$$dJBG$$dICW$$dILO$$dICN$$dOCLCQ$$dU3W$$dCAUOI$$dJG0$$dKSU$$dUCW$$dTFW$$dOCLCQ$$dAU@$$dEBLCP$$dOCLCQ$$dWYU$$dUKMGB$$dOCLCQ$$dERF$$dOCLCQ$$dUKAHL 001374388 049__ $$aISEA 001374388 050_4 $$aQA76.9.A25 001374388 08204 $$a005.8/24$$223 001374388 1112_ $$aInternational Conference on the Theory and Application of Cryptology and Information Security$$n(22nd :$$d2016 :$$cHanoi, Vietnam) 001374388 24510 $$aAdvances in cryptology -- ASIACRYPT 2016 :$$b22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings.$$nPart II /$$cJung Hee Cheon, Tsuyoshi Takagi (eds.). 001374388 2463_ $$aASIACRYPT 2016 001374388 264_1 $$aBerlin, Germany :$$bSpringer,$$c2016. 001374388 300__ $$a1 online resource (xxiv, 1055 pages) :$$billustrations 001374388 336__ $$atext$$btxt$$2rdacontent 001374388 337__ $$acomputer$$bc$$2rdamedia 001374388 338__ $$aonline resource$$bcr$$2rdacarrier 001374388 347__ $$atext file$$bPDF$$2rda 001374388 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10032 001374388 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 001374388 500__ $$aInternational conference proceedings. 001374388 500__ $$aIncludes author index. 001374388 5050_ $$aMathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation. 001374388 506__ $$aAccess limited to authorized users. 001374388 520__ $$aThe two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation. 001374388 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 22, 2016). 001374388 650_0 $$aData encryption (Computer science)$$vCongresses. 001374388 655_0 $$aElectronic books 001374388 7001_ $$aCheon, Jung Hee,$$eeditor. 001374388 7001_ $$aTakagi, Tsuyoshi$$c(Mathematician),$$eeditor. 001374388 77608 $$iPrint version:$$z9783662538890 001374388 830_0 $$aLecture notes in computer science ;$$v10032.$$x0302-9743 001374388 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001374388 852__ $$bebk 001374388 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-662-53890-6$$zOnline Access$$91397441.1 001374388 909CO $$ooai:library.usi.edu:1374388$$pGLOBAL_SET 001374388 980__ $$aBIB 001374388 980__ $$aEBOOK 001374388 982__ $$aEbook 001374388 983__ $$aOnline 001374388 994__ $$a92$$bISE