000798340 000__ 02781cam\a2200553Mi\4500 000798340 001__ 798340 000798340 005__ 20230306143519.0 000798340 006__ m\\\\\o\\d\\\\\\\\ 000798340 007__ cr\nn\nnnunnun 000798340 008__ 170728s2017\\\\gw\\\\\\o\\\\\000\0\eng\d 000798340 019__ $$a1001286837$$a1004390204 000798340 020__ $$a9783319636887 000798340 020__ $$a331963688X 000798340 020__ $$z9783319636870 000798340 020__ $$a3319636871 000798340 020__ $$a9783319636870 000798340 0247_ $$a10.1007/978-3-319-63688-7$$2doi 000798340 035__ $$aSP(OCoLC)on1002312827 000798340 035__ $$aSP(OCoLC)1002312827$$z(OCoLC)1001286837$$z(OCoLC)1004390204 000798340 040__ $$aAZU$$beng$$cAZU$$dGW5XE$$dUAB$$dCOO 000798340 049__ $$aISEA 000798340 050_4 $$aQA76.9.A25 000798340 08204 $$a005.8/24$$223 000798340 24500 $$aAdvances in Cryptology; CRYPTO 2017$$b37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I /$$cedited by Jonathan Katz, Hovav Shacham. 000798340 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2017. 000798340 300__ $$a1 online resource (xv, 793 pages) :$$billustrations. 000798340 336__ $$atext$$btxt$$2rdacontent 000798340 337__ $$acomputer$$bc$$2rdamedia 000798340 338__ $$aonline resource$$bcr$$2rdacarrier 000798340 347__ $$atext file$$bPDF$$2rda 000798340 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10401 000798340 506__ $$aAccess limited to authorized users. 000798340 520__ $$aThe three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto. 000798340 650_0 $$aComputer science. 000798340 650_0 $$aComputer communication systems. 000798340 650_0 $$aComputer security. 000798340 650_0 $$aData encryption (Computer science). 000798340 650_0 $$aComputers and civilization. 000798340 650_0 $$aComputers. 000798340 650_0 $$aLaw and legislation. 000798340 650_0 $$aManagement information systems. 000798340 7001_ $$aKatz, Jonathan.$$eeditor. 000798340 7001_ $$aShacham, Hovav.$$eeditor. 000798340 77608 $$iPrint version:$$z9783319636870 000798340 830_0 $$aLecture Notes in Computer Science ;$$v10401. 000798340 852__ $$bebk 000798340 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-63688-7$$zOnline Access$$91397441.1 000798340 909CO $$ooai:library.usi.edu:798340$$pGLOBAL_SET 000798340 980__ $$aEBOOK 000798340 980__ $$aBIB 000798340 982__ $$aEbook 000798340 983__ $$aOnline 000798340 994__ $$a92$$bISE