000745403 000__ 03123cam\a2200565Mi\4500 000745403 001__ 745403 000745403 005__ 20230306141306.0 000745403 006__ m\\\\\o\\d\\\\\\\\ 000745403 007__ cr\nn\nnnunnun 000745403 008__ 151126s2015\\\\sz\a\\\\od\\\\100\0\eng\d 000745403 020__ $$a9783662487976$$qelectronic book 000745403 020__ $$a3662487977$$qelectronic book 000745403 020__ $$z9783662487969 000745403 0247_ $$a10.1007/978-3-662-48797-6$$2doi 000745403 035__ $$aSP(OCoLC)ocn932170944 000745403 035__ $$aSP(OCoLC)932170944 000745403 040__ $$aNUI$$beng$$cNUI$$dOCLCO$$dORU$$dYDXCP$$dOCLCF$$dGW5XE$$dOCLCO 000745403 049__ $$aISEA 000745403 050_4 $$aQA76.9.A25 000745403 08204 $$a005.82$$223 000745403 1112_ $$aInternational Conference on the Theory and Application of Cryptology and Information Security$$n(21st :$$d2015 :$$cAuckland, N.Z.) 000745403 24510 $$aAdvances in Cryptology - ASIACRYPT 2015$$h[electronic resource] :$$b21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings.$$nPart I /$$cedited by Tetsu Iwata, Jung Hee Cheon. 000745403 2463_ $$aASIACRYPT 2015 000745403 264_1 $$aBerlin, Heidelberg :$$bSpringer,$$c2015. 000745403 300__ $$a1 online resource (xxv, 810 pages) :$$billustrations. 000745403 336__ $$atext$$btxt$$2rdacontent 000745403 337__ $$acomputer$$bc$$2rdamedia 000745403 338__ $$aonline resource$$bcr$$2rdacarrier 000745403 347__ $$atext file$$bPDF$$2rda 000745403 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9452 000745403 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000745403 506__ $$aAccess limited to authorized users. 000745403 520__ $$aThe two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices. 000745403 650_0 $$aData encryption (Computer science)$$vCongresses. 000745403 650_0 $$aComputer science. 000745403 650_0 $$aComputer security. 000745403 650_0 $$aData encryption (Computer science) 000745403 650_0 $$aCoding theory. 000745403 650_0 $$aComputers. 000745403 650_0 $$aComputer science$$xMathematics. 000745403 650_0 $$aManagement information systems. 000745403 7001_ $$aIwata, Tetsu.$$eeditor. 000745403 7001_ $$aCheon, Jung Hee.$$eeditor. 000745403 77608 $$iPrint version:$$z9783662487969 000745403 830_0 $$aLecture notes in computer science ;$$v9452. 000745403 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000745403 85280 $$bebk$$hSpringerLink 000745403 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-48797-6$$zOnline Access$$91397441.1 000745403 909CO $$ooai:library.usi.edu:745403$$pGLOBAL_SET 000745403 980__ $$aEBOOK 000745403 980__ $$aBIB 000745403 982__ $$aEbook 000745403 983__ $$aOnline 000745403 994__ $$a92$$bISE