Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg
Springer
[2015]
|
Schriftenreihe: | Lecture Notes in Computer Science
9453 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XXV, 802 Seiten) Illustrationen |
ISBN: | 9783662488003 9783662487990 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-48800-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209570 | ||
003 | DE-604 | ||
005 | 20161117 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662488003 |c Online |9 978-3-662-48800-3 | ||
020 | |a 9783662487990 |c Print |9 978-3-662-48799-0 | ||
024 | 7 | |a 10.1007/978-3-662-48800-3 |2 doi | |
035 | |a (OCoLC)932043109 | ||
035 | |a (DE-599)BVBBV043209570 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Iwata, Tetsu |4 edt | |
245 | 1 | 0 | |a Advances in Cryptology – ASIACRYPT 2015 |b 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II |c edited by Tetsu Iwata, Jung Hee Cheon |
264 | 1 | |a Berlin ; Heidelberg |b Springer |c [2015] | |
300 | |a 1 Online-Ressource (XXV, 802 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9453 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Mathematics of Computing | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Auckland |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Cheon, Kwang S. |4 edt | |
711 | 2 | |a ASIACRYPT |n 21. |d 2015 |c Auckland |0 (DE-588)1081159154 |4 isb | |
830 | 0 | |a Lecture Notes in Computer Science |v 9453 |w (DE-604)BV014880109 |9 9453 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-48800-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632731 |
Datensatz im Suchindex
_version_ | 1804175708732260352 |
---|---|
adam_text | ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
/
: 2015
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME SET LNCS 9452 AND 9453 CONSTITUTES THE REFEREED
PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON THE THEORY AND
APPLICATIONS OF CRYPTOLOGY AND INFORMATION SECURITY, ASIACRYPT 2015,
HELD IN AUCKLAND, NEW ZEALAND, IN NOVEMBER/DECEMBER 2015. THE 64 REVISED
FULL PAPERS AND 3 INVITED TALKS PRESENTED WERE CAREFULLY SELECTED FROM
251 SUBMISSIONS. THEY ARE ORGANIZED IN TOPICAL SECTIONS ON
INDISTINGUISHABILITY OBFUSCATION; PRFS AND HASHES; DISCRETE LOGARITHMS
AND NUMBER THEORY; SIGNATURES; MULTIPARTY COMPUTATION; PUBLIC KEY
ENCRYPTION; ABE AND IBE; ZERO-KNOWLEDGE; ATTACKS ON ASASA; NUMBER FIELD
SIEVE; HASHES AND MACS; SYMMETRIC ENCRYPTION; FOUNDATIONS; SIDE-CHANNEL
ATTACKS; DESIGN OF BLOCK CIPHERS; AUTHENTICATED ENCRYPTION; SYMMETRIC
ANALYSIS; CRYPTANALYSIS; PRIVACY AND LATTICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Iwata, Tetsu Cheon, Kwang S. |
author2_role | edt edt |
author2_variant | t i ti k s c ks ksc |
author_facet | Iwata, Tetsu Cheon, Kwang S. |
building | Verbundindex |
bvnumber | BV043209570 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)932043109 (DE-599)BVBBV043209570 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-48800-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03449nmm a2200829zcb4500</leader><controlfield tag="001">BV043209570</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161117 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662488003</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-48800-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662487990</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-48799-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-48800-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932043109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209570</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Iwata, Tetsu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in Cryptology – ASIACRYPT 2015</subfield><subfield code="b">21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II</subfield><subfield code="c">edited by Tetsu Iwata, Jung Hee Cheon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXV, 802 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9453</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Auckland</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cheon, Kwang S.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">21.</subfield><subfield code="d">2015</subfield><subfield code="c">Auckland</subfield><subfield code="0">(DE-588)1081159154</subfield><subfield code="4">isb</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9453</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9453</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-48800-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632731</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Auckland gnd-content |
genre_facet | Konferenzschrift 2015 Auckland |
id | DE-604.BV043209570 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:35Z |
institution | BVB |
institution_GND | (DE-588)1081159154 |
isbn | 9783662488003 9783662487990 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632731 |
oclc_num | 932043109 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XXV, 802 Seiten) Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Iwata, Tetsu edt Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II edited by Tetsu Iwata, Jung Hee Cheon Berlin ; Heidelberg Springer [2015] 1 Online-Ressource (XXV, 802 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9453 0302-9743 Computer science Computer security Data encryption (Computer science) Coding theory Computers Computer science / Mathematics Management information systems Computer Science Data Encryption Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing Informatik Mathematik Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Auckland gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hash-Algorithmus (DE-588)4323071-4 s Cheon, Kwang S. edt ASIACRYPT 21. 2015 Auckland (DE-588)1081159154 isb Lecture Notes in Computer Science 9453 (DE-604)BV014880109 9453 https://doi.org/10.1007/978-3-662-48800-3 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Coding theory Computers Computer science / Mathematics Management information systems Computer Science Data Encryption Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing Informatik Mathematik Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4323071-4 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II |
title_auth | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II |
title_exact_search | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II |
title_full | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II edited by Tetsu Iwata, Jung Hee Cheon |
title_fullStr | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II edited by Tetsu Iwata, Jung Hee Cheon |
title_full_unstemmed | Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II edited by Tetsu Iwata, Jung Hee Cheon |
title_short | Advances in Cryptology – ASIACRYPT 2015 |
title_sort | advances in cryptology asiacrypt 2015 21st international conference on the theory and application of cryptology and information security auckland new zealand november 29 december 3 2015 proceedings part ii |
title_sub | 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part II |
topic | Computer science Computer security Data encryption (Computer science) Coding theory Computers Computer science / Mathematics Management information systems Computer Science Data Encryption Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing Informatik Mathematik Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Coding theory Computers Computer science / Mathematics Management information systems Computer Science Data Encryption Systems and Data Security Coding and Information Theory Management of Computing and Information Systems Theory of Computation Mathematics of Computing Informatik Mathematik Kryptoanalyse Kryptosystem Hash-Algorithmus Kryptologie Sicherheitsprotokoll Konferenzschrift 2015 Auckland |
url | https://doi.org/10.1007/978-3-662-48800-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT iwatatetsu advancesincryptologyasiacrypt201521stinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityaucklandnewzealandnovember29december32015proceedingspartii AT cheonkwangs advancesincryptologyasiacrypt201521stinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityaucklandnewzealandnovember29december32015proceedingspartii AT asiacryptauckland advancesincryptologyasiacrypt201521stinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityaucklandnewzealandnovember29december32015proceedingspartii |