000845727 000__ 03475cam\a2200505Mi\4500 000845727 001__ 845727 000845727 005__ 20230306145034.0 000845727 006__ m\\\\\o\\d\\\\\\\\ 000845727 007__ cr\nn\nnnunnun 000845727 008__ 180723s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845727 019__ $$a1048595876$$a1054305177 000845727 020__ $$a9783319968810 000845727 020__ $$a3319968815 000845727 020__ $$z9783319968803 000845727 0247_ $$a10.1007/978-3-319-96881-0$$2doi 000845727 035__ $$aSP(OCoLC)on1049850066 000845727 035__ $$aSP(OCoLC)1049850066$$z(OCoLC)1048595876$$z(OCoLC)1054305177 000845727 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dUAB 000845727 049__ $$aISEA 000845727 050_4 $$aQA76.9.A25 000845727 08204 $$a005.82$$223 000845727 24500 $$aAdvances in Cryptology - CRYPTO 2018 :$$b38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II /$$cedited by Hovav Shacham, Alexandra Boldyreva. 000845727 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845727 300__ $$a1 online resource (xv, 833 pages) :$$billustrations 000845727 336__ $$atext$$btxt$$2rdacontent 000845727 337__ $$acomputer$$bc$$2rdamedia 000845727 338__ $$aonline resource$$bcr$$2rdacarrier 000845727 347__ $$atext file$$bPDF$$2rda 000845727 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10992 000845727 5050_ $$aSecure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation. 000845727 506__ $$aAccess limited to authorized users. 000845727 520__ $$aThe three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation. 000845727 650_0 $$aComputer science. 000845727 650_0 $$aComputer input-output equipment. 000845727 650_0 $$aSoftware engineering. 000845727 650_0 $$aData encryption (Computer science) 000845727 650_0 $$aArtificial intelligence. 000845727 7001_ $$aShacham, Hovav.$$eeditor. 000845727 7001_ $$aBoldyreva, Alexandra.$$eeditor. 000845727 77608 $$iPrint version: $$z9783319968803 000845727 830_0 $$aLecture notes in computer science ;$$v10992. 000845727 852__ $$bebk 000845727 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-96881-0$$zOnline Access$$91397441.1 000845727 909CO $$ooai:library.usi.edu:845727$$pGLOBAL_SET 000845727 980__ $$aEBOOK 000845727 980__ $$aBIB 000845727 982__ $$aEbook 000845727 983__ $$aOnline 000845727 994__ $$a92$$bISE