Advances in cryptology - ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings 2
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8874 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-92 DE-859 DE-861 DE-91 DE-384 DE-473 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XXII, 528 S.) Ill., graph. Darst. |
ISBN: | 9783662456071 9783662456088 |
DOI: | 10.1007/978-3-662-45608-8 |
Internformat
MARC
LEADER | 00000nam a2200000 cc4500 | ||
---|---|---|---|
001 | BV042208226 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 141126s2014 xx ad|| o|||| 10||| eng d | ||
020 | |a 9783662456071 |9 978-3-662-45607-1 | ||
020 | |a 9783662456088 |c Online |9 978-3-662-45608-8 | ||
024 | 7 | |a 10.1007/978-3-662-45608-8 |2 doi | |
035 | |a (OCoLC)897356556 | ||
035 | |a (DE-599)BVBBV042208226 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
111 | 2 | |a ASIACRYPT |n 20. |d 2014 |c Kaohsiung |j Verfasser |0 (DE-588)1062526015 |4 aut | |
245 | 1 | 0 | |a Advances in cryptology - ASIACRYPT 2014 |b 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings |n 2 |c Palash Sarkar ... (eds.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XXII, 528 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8874 | |
490 | 0 | |a Lecture notes in computer science |v ... | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Sarkar, Palash |d 1969- |e Sonstige |0 (DE-588)1062524098 |4 oth | |
773 | 0 | 8 | |w (DE-604)BV042208220 |g 2 |
830 | 0 | |a Lecture notes in computer science |v 8874 |w (DE-604)BV014880109 |9 8874 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-45608-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027646967 | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45608-8 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875638036234240 |
---|---|
adam_text |
ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CRYPTOLOGY AND CODING THEORY
AUTHENTICATED ENCRYPTION
SYMMETRIC KEY CRYPTANALYSIS
SIDE CHANNEL ANALYSIS
HYPERELLIPTIC CURVE CRYPTOGRAPHY
FACTORING AND DISCRETE LOG
CRYPTANALYSIS
SIGNATURES
ZERO KNOWLEDGE
ENCRYPTION SCHEMES
OUTSOURCING AND DELEGATION
OBFUSCATION
HOMOMORPHIC CRYPTOGRAPHY
SECRET SHARING
BLOCK CIPHERS AND PASSWORDS
BLACK-BOX SEPARATION
COMPOSABILITY
MULTI-PARTY COMPUTATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
/
: 2014
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME SET LNCS 8873 AND 8874 CONSTITUTES THE REFEREED
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON THE THEORY AND
APPLICATIONS OF CRYPTOLOGY AND INFORMATION SECURITY, ASIACRYPT 2014,
HELD IN KAOSHIUNG, TAIWAN, IN DECEMBER 2014. THE 55 REVISED FULL PAPERS
AND TWO INVITED TALKS PRESENTED WERE CAREFULLY SELECTED FROM 255
SUBMISSIONS. THEY ARE ORGANIZED IN TOPICAL SECTIONS ON CRYPTOLOGY AND
CODING THEORY; AUTHENTICATED ENCRYPTION; SYMMETRIC KEY CRYPTANALYSIS;
SIDE CHANNEL ANALYSIS; HYPERELLIPTIC CURVE CRYPTOGRAPHY; FACTORING AND
DISCRETE LOG; CRYPTANALYSIS; SIGNATURES; ZERO KNOWLEDGE; ENCRYPTION
SCHEMES; OUTSOURCING AND DELEGATION; OBFUSCATION; HOMOMORPHIC
CRYPTOGRAPHY; SECRET SHARING; BLOCK CIPHERS AND PASSWORDS; BLACK-BOX
SEPARATION; COMPOSABILITY; MULTI-PARTY COMPUTATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1062524098 |
author_corporate | ASIACRYPT Kaohsiung |
author_corporate_role | aut |
author_facet | ASIACRYPT Kaohsiung |
author_sort | ASIACRYPT Kaohsiung |
building | Verbundindex |
bvnumber | BV042208226 |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)897356556 (DE-599)BVBBV042208226 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-45608-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cc4500</leader><controlfield tag="001">BV042208226</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141126s2014 xx ad|| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662456071</subfield><subfield code="9">978-3-662-45607-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662456088</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-45608-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-45608-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897356556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042208226</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">20.</subfield><subfield code="d">2014</subfield><subfield code="c">Kaohsiung</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1062526015</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - ASIACRYPT 2014</subfield><subfield code="b">20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings</subfield><subfield code="n">2</subfield><subfield code="c">Palash Sarkar ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 528 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8874</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">...</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sarkar, Palash</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1062524098</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV042208220</subfield><subfield code="g">2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8874</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8874</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027646967</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45608-8</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042208226 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:18:48Z |
institution | BVB |
institution_GND | (DE-588)1062526015 |
isbn | 9783662456071 9783662456088 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027646967 |
oclc_num | 897356556 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (XXII, 528 S.) Ill., graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ASIACRYPT 20. 2014 Kaohsiung Verfasser (DE-588)1062526015 aut Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings 2 Palash Sarkar ... (eds.) Heidelberg [u.a.] Springer 2014 1 Online-Ressource (XXII, 528 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8874 Lecture notes in computer science ... (DE-588)1071861417 Konferenzschrift gnd-content Sarkar, Palash 1969- Sonstige (DE-588)1062524098 oth (DE-604)BV042208220 2 Lecture notes in computer science 8874 (DE-604)BV014880109 8874 https://doi.org/10.1007/978-3-662-45608-8 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings Lecture notes in computer science |
subject_GND | (DE-588)1071861417 |
title | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings |
title_auth | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings |
title_exact_search | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings |
title_full | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings 2 Palash Sarkar ... (eds.) |
title_fullStr | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings 2 Palash Sarkar ... (eds.) |
title_full_unstemmed | Advances in cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings 2 Palash Sarkar ... (eds.) |
title_short | Advances in cryptology - ASIACRYPT 2014 |
title_sort | advances in cryptology asiacrypt 2014 20th international conference on the theory and application of cryptology and information security kaoshiung taiwan december 7 11 2014 proceedings |
title_sub | 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7 - 11, 2014 ; proceedings |
topic_facet | Konferenzschrift |
url | https://doi.org/10.1007/978-3-662-45608-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027646967&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042208220 (DE-604)BV014880109 |
work_keys_str_mv | AT asiacryptkaohsiung advancesincryptologyasiacrypt201420thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritykaoshiungtaiwandecember7112014proceedings2 AT sarkarpalash advancesincryptologyasiacrypt201420thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritykaoshiungtaiwandecember7112014proceedings2 |