000845726 000__ 03460cam\a2200505Mi\4500 000845726 001__ 845726 000845726 005__ 20230306145034.0 000845726 006__ m\\\\\o\\d\\\\\\\\ 000845726 007__ cr\nn\nnnunnun 000845726 008__ 180724s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845726 019__ $$a1048595855$$a1054314336 000845726 020__ $$a9783319968841 000845726 020__ $$a331996884X 000845726 020__ $$z9783319968834 000845726 0247_ $$a10.1007/978-3-319-96884-1$$2doi 000845726 035__ $$aSP(OCoLC)on1049849906 000845726 035__ $$aSP(OCoLC)1049849906$$z(OCoLC)1048595855$$z(OCoLC)1054314336 000845726 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dUAB 000845726 049__ $$aISEA 000845726 050_4 $$aQA76.9.A25 000845726 08204 $$a005.82$$223 000845726 24500 $$aAdvances in Cryptology - CRYPTO 2018 :$$b38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I /$$cedited by Hovav Shacham, Alexandra Boldyreva. 000845726 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845726 300__ $$a1 online resource (xxiii, 823 pages) :$$billustrations. 000845726 336__ $$atext$$btxt$$2rdacontent 000845726 337__ $$acomputer$$bc$$2rdamedia 000845726 338__ $$aonline resource$$bcr$$2rdacarrier 000845726 347__ $$atext file$$bPDF$$2rda 000845726 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10991 000845726 5050_ $$aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 000845726 506__ $$aAccess limited to authorized users. 000845726 520__ $$aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 000845726 650_0 $$aComputer science. 000845726 650_0 $$aSoftware engineering. 000845726 650_0 $$aData encryption (Computer science) 000845726 650_0 $$aCoding theory. 000845726 650_0 $$aMathematical statistics. 000845726 7001_ $$aShacham, Hovav.$$eeditor. 000845726 7001_ $$aBoldyreva, Alexandra.$$eeditor. 000845726 77608 $$iPrint version: $$z9783319968834 000845726 830_0 $$aLecture notes in computer science ;$$v10991. 000845726 852__ $$bebk 000845726 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-96884-1$$zOnline Access$$91397441.1 000845726 909CO $$ooai:library.usi.edu:845726$$pGLOBAL_SET 000845726 980__ $$aEBOOK 000845726 980__ $$aBIB 000845726 982__ $$aEbook 000845726 983__ $$aOnline 000845726 994__ $$a92$$bISE