000845725 000__ 03428cam\a2200493Mi\4500 000845725 001__ 845725 000845725 005__ 20230306145034.0 000845725 006__ m\\\\\o\\d\\\\\\\\ 000845725 007__ cr\nn\nnnunnun 000845725 008__ 180723s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845725 019__ $$a1048595756$$a1054346402 000845725 020__ $$a9783319968780 000845725 020__ $$a3319968785 000845725 020__ $$z9783319968773 000845725 0247_ $$a10.1007/978-3-319-96878-0$$2doi 000845725 035__ $$aSP(OCoLC)on1049849658 000845725 035__ $$aSP(OCoLC)1049849658$$z(OCoLC)1048595756$$z(OCoLC)1054346402 000845725 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dUAB 000845725 049__ $$aISEA 000845725 050_4 $$aQA76.9.A25 000845725 08204 $$a005.82$$223 000845725 24500 $$aAdvances in Cryptology - CRYPTO 2018 :$$b38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III /$$cedited by Hovav Shacham, Alexandra Boldyreva. 000845725 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845725 300__ $$a1 online resource (xv, 787 pages) :$$billustrations. 000845725 336__ $$atext$$btxt$$2rdacontent 000845725 337__ $$acomputer$$bc$$2rdamedia 000845725 338__ $$aonline resource$$bcr$$2rdacarrier 000845725 347__ $$atext file$$bPDF$$2rda 000845725 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10993 000845725 5050_ $$aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 000845725 506__ $$aAccess limited to authorized users. 000845725 520__ $$aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 000845725 650_0 $$aComputer science. 000845725 650_0 $$aSoftware engineering. 000845725 650_0 $$aData encryption (Computer science) 000845725 650_0 $$aMathematical statistics. 000845725 7001_ $$aShacham, Hovav.$$eeditor. 000845725 7001_ $$aBoldyreva, Alexandra.$$eeditor. 000845725 77608 $$iPrint version: $$z9783319968773 000845725 830_0 $$aLecture notes in computer science ;$$v10993. 000845725 852__ $$bebk 000845725 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-96878-0$$zOnline Access$$91397441.1 000845725 909CO $$ooai:library.usi.edu:845725$$pGLOBAL_SET 000845725 980__ $$aEBOOK 000845725 980__ $$aBIB 000845725 982__ $$aEbook 000845725 983__ $$aOnline 000845725 994__ $$a92$$bISE