Scientific Library of Tomsk State University

   E-catalog        

Normal view MARC view

Public-Key Cryptography – PKC 2013 (Record no. 358234)

MARC details
000 -Маркер записи
Контрольное поле постоянной длины 06729nam a22005535i 4500
001 - Контрольный номер
Контрольное поле vtls000484705
005 - Дата корректировки
Контрольное поле 20210922070235.0
007 - Кодируемые данные (физ. описан.)
Контрольное поле постоянной длины cr nn 008mamaa
008 - Кодируемые данные
Контрольное поле постоянной длины 140715s2013 gw | s |||| 0|eng d
020 ## - Индекс ISBN
ISBN 9783642363627
-- 978-3-642-36362-7
024 7# - Прочие стандартные номера
Стандартный номер 10.1007/978-3-642-36362-7
Источник номера doi
035 ## - Системный контрольный номер
Системный контрольный номер to000484705
040 ## - Источник каталогиз.
Служба первич. каталог. Springer
Служба, преобразующая запись Springer
Организация, изменившая запись RU-ToGU
050 #4 - Расстановочный код библ. Конгресса
Классификационный индекс QA76.9.A25
072 #7 - Код предметной/темат. категории
Код предметной/темат. категории URY
Источник кода bicssc
072 #7 - Код предметной/темат. категории
Код предметной/темат. категории COM053000
Источник кода bisacsh
082 04 - Индекс Дьюи
Индекс Дьюи 005.82
Номер издания 23
100 1# - Автор
Автор Kurosawa, Kaoru.
Роль лиц editor.
9 (RLIN) 331648
245 10 - Заглавие
Заглавие Public-Key Cryptography – PKC 2013
Физический носитель [electronic resource] :
Продолж. заглавия 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings /
Ответственность edited by Kaoru Kurosawa, Goichiro Hanaoka.
260 ## - Выходные данные
Место издания Berlin, Heidelberg :
Издательство Springer Berlin Heidelberg :
-- Imprint: Springer,
Дата издания 2013.
300 ## - Физическое описание
Объем XIV, 518 p. 46 illus.
Иллюстрации/тип воспроизводства online resource.
336 ## - Тип содержимого
Тип содержимого text
Content type code txt
Source rdacontent
337 ## - Средство доступа
Средство доступа computer
Media type code c
Source rdamedia
338 ## - Тип носителя
Тип носителя online resource
Carrier type code cr
Source rdacarrier
490 1# - Серия
Заглавие серии Lecture Notes in Computer Science,
ISSN серии 0302-9743 ;
№ тома 7778
505 0# - Примечание о содержании
Содержание Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
520 ## - Аннотация
Аннотация This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
650 #0 - Тематические рубрики
Основная рубрика Computer Science.
9 (RLIN) 155490
650 #0 - Тематические рубрики
Основная рубрика Data protection.
9 (RLIN) 303937
650 #0 - Тематические рубрики
Основная рубрика Data encryption (Computer science).
9 (RLIN) 566260
650 #0 - Тематические рубрики
Основная рубрика Coding theory.
9 (RLIN) 303096
650 #0 - Тематические рубрики
Основная рубрика Information systems.
9 (RLIN) 303226
650 14 - Тематические рубрики
Основная рубрика Computer Science.
9 (RLIN) 155490
650 24 - Тематические рубрики
Основная рубрика Data Encryption.
9 (RLIN) 566261
650 24 - Тематические рубрики
Основная рубрика Systems and Data Security.
9 (RLIN) 303939
650 24 - Тематические рубрики
Основная рубрика Coding and Information Theory.
9 (RLIN) 303101
650 24 - Тематические рубрики
Основная рубрика e-Commerce/e-business.
9 (RLIN) 413336
650 24 - Тематические рубрики
Основная рубрика Computer Appl. in Administrative Data Processing.
9 (RLIN) 307999
700 1# - Другие авторы
Другие авторы Hanaoka, Goichiro.
Роль лиц editor.
9 (RLIN) 417130
710 2# - Другие организации
Организация/юрисдикция SpringerLink (Online service)
9 (RLIN) 143950
773 0# - Источник информации
Название источника Springer eBooks
830 #0 - Заголовок добавочной библ.записи на серию — унифицированное заглавие
Унифицированное заглавие Lecture Notes in Computer Science,
9 (RLIN) 279505
856 40 - Электронный адрес документа
URL <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a>
912 ## - Coursera for Campus: онлайн курсы для ТГУ
Coursera for Campus: онлайн курсы для ТГУ ZDB-2-SCS
912 ## - Coursera for Campus: онлайн курсы для ТГУ
Coursera for Campus: онлайн курсы для ТГУ ZDB-2-LNC
999 ## - Системные контрольные номера (Koha)
biblionumber (Koha) 358234

No items available.