Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradi...
Enregistré dans:
Auteur principal : | |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings / edited by Amit Sahai. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7785 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Theory of Cryptography Autre format: Theory of Cryptography |
LEADER | 03993clm a2200673 4500 | ||
---|---|---|---|
001 | PPN168330261 | ||
003 | http://www.sudoc.fr/168330261 | ||
005 | 20241001155300.0 | ||
010 | |a 978-3-642-36594-2 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-36594-2 |2 DOI |
035 | |a (OCoLC)829434167 | ||
035 | |a Springer978-3-642-36594-2 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36594-2 | ||
035 | |a Springer-11645-978-3-642-36594-2 | ||
100 | |a 20130325d2013 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Theory of Cryptography |e 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings |f edited by Amit Sahai. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7785 | |
330 | |a This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. | ||
359 | 1 | |a Study of known paradigms -- Approaches, and techniques, directed towards their better understanding and utilization -- Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones -- Formulation and treatment of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7785 | |
452 | | | |t Theory of Cryptography |b Texte imprimé |y 9783642365935 | |
452 | | | |t Theory of Cryptography |b Texte imprimé |y 9783642365959 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Computation by Abstract Devices | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a Theory of Computation | |
610 | 2 | |a Algorithms | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |a Sahai |b Amit |4 651 | |
701 | 1 | |a Sahai |b Amit |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-36594-2 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-LKTD0GL1-T |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830857478 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36594-2 | |
915 | |5 441099901:830857478 |b SPRING13-00769 | ||
930 | |5 441099901:830857478 |b 441099901 |j g | ||
991 | |5 441099901:830857478 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:14 | ||
997 | |a NUM |b SPRING13-00769 |d NUMpivo |e EM |s d | ||
998 | |a 978595 |