Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9057 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVIII, 838 p. 102 illus) |
ISBN: | 9783662468036 9783662468029 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-46803-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544883 | ||
003 | DE-604 | ||
005 | 20150709 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662468036 |c Online |9 978-3-662-46803-6 | ||
020 | |a 9783662468029 |c Print |9 978-3-662-46802-9 | ||
024 | 7 | |a 10.1007/978-3-662-46803-6 |2 doi | |
035 | |a (OCoLC)908701866 | ||
035 | |a (DE-599)BVBBV042544883 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in Cryptology - EUROCRYPT 2015 |b 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II |c edited by Elisabeth Oswald, Marc Fischlin |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2015 | |
300 | |a 1 Online-Ressource (XVIII, 838 p. 102 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9057 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer software | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Sofia |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Oswald, Elisabeth |e Sonstige |0 (DE-588)1069646024 |4 oth | |
711 | 2 | |a EUROCRYPT |n 34. |d 2015 |c Sofia |j Sonstige |0 (DE-588)1069648221 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9057 |w (DE-604)BV014880109 |9 9057 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-46803-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 |
Datensatz im Suchindex
_version_ | 1805075967140429824 |
---|---|
adam_text |
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015
/ OSWALD, ELISABETH
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
UNIVERSAL SIGNATURE AGGREGATORS
FULLY STRUCTURE-PRESERVING SIGNATURES AND SHRINKING COMMITMENTS
DISJUNCTIONS FOR HASH PROOF SYSTEMS: NEW CONSTRUCTIONS AND APPLICATIONS
QUASI-ADAPTIVE NIZK FOR LINEAR SUBSPACES REVISITED
LEAKAGE-RESILIENT CIRCUITS REVISITED – OPTIMAL NUMBER OF COMPUTING
COMPONENTS WITHOUT LEAK-FREE HARDWARE
NOISY LEAKAGE
PRIVACY-FREE GARBLED CIRCUITS WITH APPLICATIONS TO EFFICIENT
ZERO-KNOWLEDGE
TWO HALVES MAKE A WHOLE: REDUCING DATA TRANSFER IN GARBLED CIRCUITS
USING HALF GATES
ONE-OUT-OF-MANY PROOFS: OR HOW TO LEAK A SECRET AND SPEND A COIN
THE BITCOIN BACKBONE PROTOCOL: ANALYSIS AND APPLICATIONS
LINEAR SECRET SHARING SCHEMES FROM ERROR CORRECTING CODES
FUNCTION SECRET SHARING
CLUSTER COMPUTING IN ZERO KNOWLEDGE
HOSTING SERVICES ON AN UNTRUSTED CLOUD
HOW TO OBFUSCATE PROGRAMS DIRECTLY
CRYPTOGRAPHIC AGENTS: TOWARDS A UNIFIED THEORY OF COMPUTING ON ENCRYPTED
DATA
EXECUTABLE PROOFS, INPUT-SIZE HIDING SECURE COMPUTATION AND A NEW IDEAL
WORLD
SEMANTICALLY SECURE ORDER-REVEALING ENCRYPTION: MULTI-INPUT FUNCTIONAL
ENCRYPTION WITHOUT OBFUSCATION
IMPROVED DUAL SYSTEM ABE IN PRIME-ORDER GROUPS VIA PREDICATE ENCODINGS
RESISTING RANDOMNESS SUBVERSION: FAST DETERMINISTIC AND HEDGED
PUBLIC-KEY ENCRYPTION IN THE STANDARD MODEL
CRYPTOGRAPHIC REVERSE FIREWALLS
MIND THE GAP: MODULAR MACHINE-CHECKED PROOFS OF ONE-ROUND KEY EXCHANGE
PROTOCOLS
AUTHENTICATED KEY EXCHANGE FROM IDEAL LATTICES
NON-INTERACTIVE ZERO-KNOWLEDGE PROOFS IN THE QUANTUM RANDOM ORACLE MODEL
PRIVACY AMPLIFICATION IN THE ISOLATED QUBITS MODEL
GENERIC HARDNESS OF THE MULTIPLE DISCRETE LOGARITHM PROBLEM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015
/ OSWALD, ELISABETH
: 2015
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME PROCEEDINGS LNCS 9056 + 9057 CONSTITUTES THE PROCEEDINGS
OF THE 34TH ANNUAL INTERNATIONAL CONFERENCE ON THE THEORY AND
APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES, EUROCRYPT 2015, HELD IN SOFIA,
BULGARIA, IN APRIL 2015. THE 57 FULL PAPERS INCLUDED IN THESE VOLUMES
WERE CAREFULLY REVIEWED AND SELECTED FROM 194 SUBMISSIONS. THE PAPERS
ARE ORGANIZED IN TOPICAL SECTIONS NAMED: HONORABLE MENTIONS, RANDOM
NUMBER GENERATORS, NUMBER FIELD SIEVE, ALGORITHMIC CRYPTANALYSIS,
SYMMETRIC CRYPTANALYSIS, HASH FUNCTIONS, EVALUATION IMPLEMENTATION,
MASKING, FULLY HOMOMORPHIC ENCRYPTION, RELATED-KEY ATTACKS, FULLY
MONOMORPHIC ENCRYPTION, EFFICIENT TWO-PARTY PROTOCOLS, SYMMETRIC
CRYPTANALYSIS, LATTICES, SIGNATURES, ZERO-KNOWLEDGE PROOFS,
LEAKAGE-RESILIENT CRYPTOGRAPHY, GARBLED CIRCUITS, CRYPTO CURRENCIES,
SECRET SHARING, OUTSOURCING COMPUTATIONS, OBFUSCATION AND E-VOTING,
MULTI-PARTY COMPUTATIONS, ENCRYPTION, RESISTANT PROTOCOLS, KEY EXCHANGE,
QUANTUM CRYPTOGRAPHY, AND DISCRETE LOGARITHMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1069646024 |
building | Verbundindex |
bvnumber | BV042544883 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701866 (DE-599)BVBBV042544883 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-46803-6 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV042544883</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150709</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662468036</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-46803-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662468029</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-46802-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-46803-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544883</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in Cryptology - EUROCRYPT 2015</subfield><subfield code="b">34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II</subfield><subfield code="c">edited by Elisabeth Oswald, Marc Fischlin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 838 p. 102 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9057</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Sofia</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oswald, Elisabeth</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1069646024</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">EUROCRYPT</subfield><subfield code="n">34.</subfield><subfield code="d">2015</subfield><subfield code="c">Sofia</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1069648221</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9057</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9057</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-46803-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Sofia gnd-content |
genre_facet | Konferenzschrift 2015 Sofia |
id | DE-604.BV042544883 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T05:49:48Z |
institution | BVB |
institution_GND | (DE-588)1069648221 |
isbn | 9783662468036 9783662468029 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978889 |
oclc_num | 908701866 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVIII, 838 p. 102 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II edited by Elisabeth Oswald, Marc Fischlin Berlin, Heidelberg Springer Berlin Heidelberg 2015 1 Online-Ressource (XVIII, 838 p. 102 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9057 0302-9743 Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Sofia gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Oswald, Elisabeth Sonstige (DE-588)1069646024 oth EUROCRYPT 34. 2015 Sofia Sonstige (DE-588)1069648221 oth Lecture Notes in Computer Science 9057 (DE-604)BV014880109 9057 https://doi.org/10.1007/978-3-662-46803-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)1071861417 |
title | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II |
title_auth | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II |
title_exact_search | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II |
title_full | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II edited by Elisabeth Oswald, Marc Fischlin |
title_fullStr | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II edited by Elisabeth Oswald, Marc Fischlin |
title_full_unstemmed | Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II edited by Elisabeth Oswald, Marc Fischlin |
title_short | Advances in Cryptology - EUROCRYPT 2015 |
title_sort | advances in cryptology eurocrypt 2015 34th annual international conference on the theory and applications of cryptographic techniques sofia bulgaria april 26 30 2015 proceedings part ii |
title_sub | 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II |
topic | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Data Encryption Algorithm Analysis and Problem Complexity Systems and Data Security Management of Computing and Information Systems Informatik Kryptosystem Kryptologie Konferenzschrift 2015 Sofia |
url | https://doi.org/10.1007/978-3-662-46803-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978889&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT oswaldelisabeth advancesincryptologyeurocrypt201534thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquessofiabulgariaapril26302015proceedingspartii AT eurocryptsofia advancesincryptologyeurocrypt201534thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquessofiabulgariaapril26302015proceedingspartii |