000745404 000__ 03085cam\a2200553Mi\4500 000745404 001__ 745404 000745404 005__ 20230306141306.0 000745404 006__ m\\\\\o\\d\\\\\\\\ 000745404 007__ cr\nn\nnnunnun 000745404 008__ 151126s2015\\\\gw\\\\\\od\\\\000\0\eng\d 000745404 020__ $$a9783662488003$$qelectronic book 000745404 020__ $$a3662488000$$qelectronic book 000745404 020__ $$z9783662487990 000745404 0247_ $$a10.1007/978-3-662-48800-3$$2doi 000745404 035__ $$aSP(OCoLC)ocn932170946 000745404 035__ $$aSP(OCoLC)932170946 000745404 040__ $$aNUI$$beng$$cNUI$$dOCLCO$$dORU$$dYDXCP$$dOCLCF$$dGW5XE$$dOCLCO 000745404 049__ $$aISEA 000745404 050_4 $$aQA76.9.A25 000745404 08204 $$a005.8/2$$223 000745404 1112_ $$aInternational Conference on the Theory and Application of Cryptology and Information Security$$n(21st :$$d2015 :$$cAuckland, N.Z.) 000745404 24510 $$aAdvances in Cryptology - ASIACRYPT 2015$$h[electronic resource] :$$b21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015, Proceedings.$$nPart II /$$cedited by Tetsu Iwata, Jung Hee Cheon. 000745404 264_1 $$aHeidelberg :$$bSpringer,$$c2015. 000745404 300__ $$a1 online resource (xxv, 802 pages) :$$billustrations. 000745404 336__ $$atext$$btxt$$2rdacontent 000745404 337__ $$acomputer$$bc$$2rdamedia 000745404 338__ $$aonline resource$$bcr$$2rdacarrier 000745404 347__ $$atext file$$bPDF$$2rda 000745404 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9453 000745404 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000745404 506__ $$aAccess limited to authorized users. 000745404 520__ $$aThe two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices. 000745404 650_0 $$aData encryption (Computer science)$$vCongresses. 000745404 650_0 $$aComputer science. 000745404 650_0 $$aComputer security. 000745404 650_0 $$aData encryption (Computer science) 000745404 650_0 $$aCoding theory. 000745404 650_0 $$aComputers. 000745404 650_0 $$aComputer science$$xMathematics. 000745404 650_0 $$aManagement information systems. 000745404 7001_ $$aIwata, Tetsu.$$eeditor. 000745404 7001_ $$aCheon, Jung Hee.$$eeditor. 000745404 77608 $$iPrint version:$$z9783662487990 000745404 830_0 $$aLecture notes in computer science ;$$v9453. 000745404 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000745404 85280 $$bebk$$hSpringerLink 000745404 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-48800-3$$zOnline Access$$91397441.1 000745404 909CO $$ooai:library.usi.edu:745404$$pGLOBAL_SET 000745404 980__ $$aEBOOK 000745404 980__ $$aBIB 000745404 982__ $$aEbook 000745404 983__ $$aOnline 000745404 994__ $$a92$$bISE