Advances in Cryptology -- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9056 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVII, 818 p. 123 illus) |
ISBN: | 9783662468005 9783662467992 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-46800-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544882 | ||
003 | DE-604 | ||
005 | 20150709 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662468005 |c Online |9 978-3-662-46800-5 | ||
020 | |a 9783662467992 |c Print |9 978-3-662-46799-2 | ||
024 | 7 | |a 10.1007/978-3-662-46800-5 |2 doi | |
035 | |a (OCoLC)908701874 | ||
035 | |a (DE-599)BVBBV042544882 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in Cryptology -- EUROCRYPT 2015 |b 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I |c edited by Elisabeth Oswald, Marc Fischlin |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2015 | |
300 | |a 1 Online-Ressource (XVII, 818 p. 123 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9056 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer software | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Sofia |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Oswald, Elisabeth |e Sonstige |0 (DE-588)1069646024 |4 oth | |
711 | 2 | |a EUROCRYPT |n 34. |d 2015 |c Sofia |j Sonstige |0 (DE-588)1069648221 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9056 |w (DE-604)BV014880109 |9 9056 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-46800-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 |
Datensatz im Suchindex
_version_ | 1805075967146721280 |
---|---|
adam_text |
ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
/ OSWALD, ELISABETH
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CRYPTANALYSIS OF THE MULTILINEAR MAP OVER THE INTEGERS
ROBUST AUTHENTICATED-ENCRYPTION AEZ AND THE PROBLEM THAT IT SOLVES
ON THE BEHAVIORS OF AFFINE EQUIVALENT SBOXES REGARDING DIFFERENTIAL AND
LINEAR ATTACKS
A PROVABLE-SECURITY ANALYSIS OF INTEL’S SECURE KEY RNG
A FORMAL TREATMENT OF BACKDOORED PSEUDORANDOM GENERATORS
IMPROVING NFS FOR THE DISCRETE LOGARITHM PROBLEM IN NON-PRIME FINITE
FIELDS
THE MULTIPLE NUMBER FIELD SIEVE WITH CONJUGATION AND GENERALIZED
BETTER ALGORITHMS FOR LWE AND LWR
ON COMPUTING NEAREST NEIGHBORS WITH APPLICATIONS TO DECODING OF BINARY
LINEAR CODES
CRYPTANALYTIC TIME-MEMORY-DATA TRADEOFFS FOR FX-CONSTRUCTIONS WITH
APPLICATIONS TO PRINCE AND PRIDE
A GENERIC APPROACH TO INVARIANT SUBSPACE ATTACKS: CRYPTANALYSIS OF
ROBIN, ISCREAM AND ZORRO
STRUCTURAL EVALUATION BY GENERALIZED INTEGRAL PROPERTY
CRYPTANALYSIS OF SP NETWORKS WITH PARTIAL NON-LINEAR LAYERS
THE SUM CAN BE WEAKER THAN EACH PART
SPHINCS: PRACTICAL STATELESS HASH-BASED SIGNATURES
MAKING MASKING SECURITY PROOFS CONCRETE: OR HOW TO EVALUATE THE SECURITY
OF ANY LEAKING DEVICE
CIPHERS FOR MPC AND FHE
VERIFIED PROOFS OF HIGHER-ORDER MASKING
INNER PRODUCT MASKING REVISITED
FULLY HOMOMOPHIC ENCRYPTION OVER THE INTEGERS REVISITED
(BATCH) FULLY HOMOMORPHIC ENCRYPTION OVER INTEGERS FOR NON-BINARY
MESSAGE SPACES
KDM-CCA SECURITY FROM RKA SECURE AUTHENTICATED ENCRYPTION
ON THE PROVABLE SECURITY OF THE ITERATED EVEN-MANSOUR CIPHER AGAINST
RELATED-KEY AND CHOSEN-KEY ATTACKS
FHEW: BOOTSTRAPPING HOMOMORPHIC ENCRYPTION IN LESS THAN A SECOND
BOOTSTRAPPING FOR HELIB
MORE EFFICIENT OBLIVIOUS TRANSFER EXTENSIONS WITH SECURITY FOR MALICIOUS
ADVERSARIES
HOW TO EFFICIENTLY EVALUATE RAM PROGRAMS WITH MALICIOUS SECURITY
CUBE ATTACKS AND CUBE-ATTACK-LIKE CRYPTANALYSIS ON THE ROUND-REDUCED
KECCAK SPONGE FUNCTION
TWISTED POLYNOMIALS AND FORGERY ATTACKS ON GCM
QUADRATIC TIME, LINEAR SPACE ALGORITHMS FOR GRAM-SCHMIDT
ORTHOGONALIZATION AND GAUSSIAN SAMPLING IN STRUCTURED LATTICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
/ OSWALD, ELISABETH
: 2015
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME PROCEEDINGS LNCS 9056 + 9057 CONSTITUTES THE PROCEEDINGS
OF THE 34TH ANNUAL INTERNATIONAL CONFERENCE ON THE THEORY AND
APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES, EUROCRYPT 2015, HELD IN SOFIA,
BULGARIA, IN APRIL 2015. THE 57 FULL PAPERS INCLUDED IN THESE VOLUMES
WERE CAREFULLY REVIEWED AND SELECTED FROM 194 SUBMISSIONS. THE PAPERS
ARE ORGANIZED IN TOPICAL SECTIONS NAMED: HONORABLE MENTIONS, RANDOM
NUMBER GENERATORS, NUMBER FIELD SIEVE, ALGORITHMIC CRYPTANALYSIS,
SYMMETRIC CRYPTANALYSIS, HASH FUNCTIONS, EVALUATION IMPLEMENTATION,
MASKING, FULLY HOMOMORPHIC ENCRYPTION, RELATED-KEY ATTACKS, FULLY
MONOMORPHIC ENCRYPTION, EFFICIENT TWO-PARTY PROTOCOLS, SYMMETRIC
CRYPTANALYSIS, LATTICES, SIGNATURES, ZERO-KNOWLEDGE PROOFS,
LEAKAGE-RESILIENT CRYPTOGRAPHY, GARBLED CIRCUITS, CRYPTO CURRENCIES,
SECRET SHARING, OUTSOURCING COMPUTATIONS, OBFUSCATION AND E-VOTING,
MULTI-PARTY COMPUTATIONS, ENCRYPTION, RESISTANT PROTOCOLS, KEY EXCHANGE,
QUANTUM CRYPTOGRAPHY, AND DISCRETE LOGARITHMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1069646024 |
building | Verbundindex |
bvnumber | BV042544882 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701874 (DE-599)BVBBV042544882 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-46800-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV042544882</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150709</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662468005</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-46800-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662467992</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-46799-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-46800-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701874</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544882</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in Cryptology -- EUROCRYPT 2015</subfield><subfield code="b">34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I</subfield><subfield code="c">edited by Elisabeth Oswald, Marc Fischlin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 818 p. 123 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9056</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Sofia</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oswald, Elisabeth</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1069646024</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">EUROCRYPT</subfield><subfield code="n">34.</subfield><subfield code="d">2015</subfield><subfield code="c">Sofia</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1069648221</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9056</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9056</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-46800-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Sofia gnd-content |
genre_facet | Konferenzschrift 2015 Sofia |
id | DE-604.BV042544882 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T05:49:48Z |
institution | BVB |
institution_GND | (DE-588)1069648221 |
isbn | 9783662468005 9783662467992 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978888 |
oclc_num | 908701874 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 818 p. 123 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I edited by Elisabeth Oswald, Marc Fischlin Berlin, Heidelberg Springer Berlin Heidelberg 2015 1 Online-Ressource (XVII, 818 p. 123 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9056 0302-9743 Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Sofia gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Oswald, Elisabeth Sonstige (DE-588)1069646024 oth EUROCRYPT 34. 2015 Sofia Sonstige (DE-588)1069648221 oth Lecture Notes in Computer Science 9056 (DE-604)BV014880109 9056 https://doi.org/10.1007/978-3-662-46800-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)1071861417 |
title | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I |
title_auth | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I |
title_exact_search | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I |
title_full | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I edited by Elisabeth Oswald, Marc Fischlin |
title_fullStr | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I edited by Elisabeth Oswald, Marc Fischlin |
title_full_unstemmed | Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I edited by Elisabeth Oswald, Marc Fischlin |
title_short | Advances in Cryptology -- EUROCRYPT 2015 |
title_sort | advances in cryptology eurocrypt 2015 34th annual international conference on the theory and applications of cryptographic techniques sofia bulgaria april 26 30 2015 proceedings part i |
title_sub | 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I |
topic | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem Kryptologie Konferenzschrift 2015 Sofia |
url | https://doi.org/10.1007/978-3-662-46800-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978888&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT oswaldelisabeth advancesincryptologyeurocrypt201534thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquessofiabulgariaapril26302015proceedingsparti AT eurocryptsofia advancesincryptologyeurocrypt201534thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquessofiabulgariaapril26302015proceedingsparti |