|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3264615 |
003 |
MWH |
005 |
20191109223727.0 |
007 |
cr nn 008mamaa |
008 |
191109s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030346218
|
024 |
7 |
|
|a 10.1007/978-3-030-34621-8
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-030-34621-8
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
245 |
1 |
0 |
|a Advances in Cryptology – ASIACRYPT 2019
|h [electronic resource] :
|b 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II /
|c edited by Steven D. Galbraith, Shiho Moriai.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XV, 669 p. 249 illus., 28 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11922
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Lattices -- Symmetric Cryptography -- Isogenies -- Obfuscation -- Multiparty Computation -- Quantum -- E-cash and Blockchain -- Codes -- Authenticated Encryption -- Multilinear Maps -- Homomorphic Encryption -- Combinatorial Cryptography -- Signatures -- Public Key Encryption -- Side Channels -- Functional Encryption -- Zero Knowledge.
|
520 |
|
|
|a The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data mining.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Galbraith, Steven D.
|e editor.
|0 (orcid)0000-0001-7114-8377
|1 https://orcid.org/0000-0001-7114-8377
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Moriai, Shiho.
|e editor.
|0 (orcid)0000-0002-6072-6183
|1 https://orcid.org/0000-0002-6072-6183
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11922
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-030-34621-8
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b3264615x
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21777779
|z 02-26-20
|
999 |
f |
f |
|i 7d88a847-b09f-5091-8e20-668908199788
|s d7bbc78f-4464-51e1-90aa-cadca13608fb
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|