Normal view
MARC view
Public-Key Cryptography – PKC 2013 (Record no. 358234)
[ view plain ]
000 -Маркер записи | |
---|---|
Контрольное поле постоянной длины | 06729nam a22005535i 4500 |
001 - Контрольный номер | |
Контрольное поле | vtls000484705 |
005 - Дата корректировки | |
Контрольное поле | 20210922070235.0 |
007 - Кодируемые данные (физ. описан.) | |
Контрольное поле постоянной длины | cr nn 008mamaa |
008 - Кодируемые данные | |
Контрольное поле постоянной длины | 140715s2013 gw | s |||| 0|eng d |
020 ## - Индекс ISBN | |
ISBN | 9783642363627 |
-- | 978-3-642-36362-7 |
024 7# - Прочие стандартные номера | |
Стандартный номер | 10.1007/978-3-642-36362-7 |
Источник номера | doi |
035 ## - Системный контрольный номер | |
Системный контрольный номер | to000484705 |
040 ## - Источник каталогиз. | |
Служба первич. каталог. | Springer |
Служба, преобразующая запись | Springer |
Организация, изменившая запись | RU-ToGU |
050 #4 - Расстановочный код библ. Конгресса | |
Классификационный индекс | QA76.9.A25 |
072 #7 - Код предметной/темат. категории | |
Код предметной/темат. категории | URY |
Источник кода | bicssc |
072 #7 - Код предметной/темат. категории | |
Код предметной/темат. категории | COM053000 |
Источник кода | bisacsh |
082 04 - Индекс Дьюи | |
Индекс Дьюи | 005.82 |
Номер издания | 23 |
100 1# - Автор | |
Автор | Kurosawa, Kaoru. |
Роль лиц | editor. |
9 (RLIN) | 331648 |
245 10 - Заглавие | |
Заглавие | Public-Key Cryptography – PKC 2013 |
Физический носитель | [electronic resource] : |
Продолж. заглавия | 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings / |
Ответственность | edited by Kaoru Kurosawa, Goichiro Hanaoka. |
260 ## - Выходные данные | |
Место издания | Berlin, Heidelberg : |
Издательство | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Дата издания | 2013. |
300 ## - Физическое описание | |
Объем | XIV, 518 p. 46 illus. |
Иллюстрации/тип воспроизводства | online resource. |
336 ## - Тип содержимого | |
Тип содержимого | text |
Content type code | txt |
Source | rdacontent |
337 ## - Средство доступа | |
Средство доступа | computer |
Media type code | c |
Source | rdamedia |
338 ## - Тип носителя | |
Тип носителя | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - Серия | |
Заглавие серии | Lecture Notes in Computer Science, |
ISSN серии | 0302-9743 ; |
№ тома | 7778 |
505 0# - Примечание о содержании | |
Содержание | Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. |
520 ## - Аннотация | |
Аннотация | This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. |
650 #0 - Тематические рубрики | |
Основная рубрика | Computer Science. |
9 (RLIN) | 155490 |
650 #0 - Тематические рубрики | |
Основная рубрика | Data protection. |
9 (RLIN) | 303937 |
650 #0 - Тематические рубрики | |
Основная рубрика | Data encryption (Computer science). |
9 (RLIN) | 566260 |
650 #0 - Тематические рубрики | |
Основная рубрика | Coding theory. |
9 (RLIN) | 303096 |
650 #0 - Тематические рубрики | |
Основная рубрика | Information systems. |
9 (RLIN) | 303226 |
650 14 - Тематические рубрики | |
Основная рубрика | Computer Science. |
9 (RLIN) | 155490 |
650 24 - Тематические рубрики | |
Основная рубрика | Data Encryption. |
9 (RLIN) | 566261 |
650 24 - Тематические рубрики | |
Основная рубрика | Systems and Data Security. |
9 (RLIN) | 303939 |
650 24 - Тематические рубрики | |
Основная рубрика | Coding and Information Theory. |
9 (RLIN) | 303101 |
650 24 - Тематические рубрики | |
Основная рубрика | e-Commerce/e-business. |
9 (RLIN) | 413336 |
650 24 - Тематические рубрики | |
Основная рубрика | Computer Appl. in Administrative Data Processing. |
9 (RLIN) | 307999 |
700 1# - Другие авторы | |
Другие авторы | Hanaoka, Goichiro. |
Роль лиц | editor. |
9 (RLIN) | 417130 |
710 2# - Другие организации | |
Организация/юрисдикция | SpringerLink (Online service) |
9 (RLIN) | 143950 |
773 0# - Источник информации | |
Название источника | Springer eBooks |
830 #0 - Заголовок добавочной библ.записи на серию — унифицированное заглавие | |
Унифицированное заглавие | Lecture Notes in Computer Science, |
9 (RLIN) | 279505 |
856 40 - Электронный адрес документа | |
URL | <a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a> |
912 ## - Coursera for Campus: онлайн курсы для ТГУ | |
Coursera for Campus: онлайн курсы для ТГУ | ZDB-2-SCS |
912 ## - Coursera for Campus: онлайн курсы для ТГУ | |
Coursera for Campus: онлайн курсы для ТГУ | ZDB-2-LNC |
999 ## - Системные контрольные номера (Koha) | |
biblionumber (Koha) | 358234 |
No items available.