000779473 000__ 03180cam\a2200529Ii\4500 000779473 001__ 779473 000779473 005__ 20230306143020.0 000779473 006__ m\\\\\o\\d\\\\\\\\ 000779473 007__ cr\nn\nnnunnun 000779473 008__ 170209s2017\\\\sz\\\\\\o\\\\\101\0\eng\d 000779473 019__ $$a972127712$$a974650173 000779473 020__ $$a9783319521534$$q(electronic book) 000779473 020__ $$a3319521535$$q(electronic book) 000779473 020__ $$z9783319521527 000779473 0247_ $$a10.1007/978-3-319-52153-4$$2doi 000779473 035__ $$aSP(OCoLC)ocn971892780 000779473 035__ $$aSP(OCoLC)971892780$$z(OCoLC)972127712$$z(OCoLC)974650173 000779473 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDX$$dNJR$$dOCLCF$$dUAB$$dOCLCO$$dESU$$dUPM$$dIOG 000779473 049__ $$aISEA 000779473 050_4 $$aQA76.9.A25 000779473 08204 $$a005.8/24$$223 000779473 1112_ $$aCryptographers' Track at RSA Conference$$d(2017 :$$cSan Francisco, Calif.) 000779473 24510 $$aTopics in cryptology -- CT-RSA 2017 :$$bthe Cryptographers' track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings /$$cHelena Handschuh (ed.). 000779473 2463_ $$aCT-RSA 2017 000779473 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000779473 300__ $$a1 online resource (xiii, 452 pages) :$$billustrations. 000779473 336__ $$atext$$btxt$$2rdacontent 000779473 337__ $$acomputer$$bc$$2rdamedia 000779473 338__ $$aonline resource$$bcr$$2rdacarrier 000779473 347__ $$atext file$$bPDF$$2rda 000779473 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10159 000779473 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000779473 500__ $$aInternational conference proceedings. 000779473 500__ $$aIncludes author index. 000779473 5050_ $$aPublic Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant Implementations -- Side-channel Resistant Implementations -- Digital Signatures and Random Numbers -- Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Symmetric Key Constructions -- 2017 Selected Topics -- Improved Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms. 000779473 506__ $$aAccess limited to authorized users. 000779473 520__ $$aThis book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers. 000779473 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 9, 2017). 000779473 650_0 $$aData encryption (Computer science)$$vCongresses. 000779473 7001_ $$aHandschuh, Helena,$$eeditor. 000779473 77608 $$iPrint version:$$z9783319521527 000779473 830_0 $$aLecture notes in computer science ;$$v10159. 000779473 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000779473 852__ $$bebk 000779473 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-52153-4$$zOnline Access$$91397441.1 000779473 909CO $$ooai:library.usi.edu:779473$$pGLOBAL_SET 000779473 980__ $$aEBOOK 000779473 980__ $$aBIB 000779473 982__ $$aEbook 000779473 983__ $$aOnline 000779473 994__ $$a92$$bISE