000 | 02788nam a22003855i 4500 | ||
---|---|---|---|
001 | 307702 | ||
003 | MX-SnUAN | ||
005 | 20160429160143.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2013 gw | o |||| 0|eng d | ||
020 |
_a9783642420337 _99783642420337 |
||
024 | 7 |
_a10.1007/9783642420337 _2doi |
|
035 | _avtls000362294 | ||
039 | 9 |
_a201509031037 _bVLOAD _c201405070327 _dVLOAD _y201402211046 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aSako, Kazue. _eeditor. _9338435 |
|
245 | 1 | 0 |
_aAdvances in Cryptology - ASIACRYPT 2013 : _b19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I / _cedited by Kazue Sako, Palash Sarkar. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_axxiv, 546 páginas 82 ilustraciones _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8269 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aMessage Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions. | |
520 | _aThe two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aSarkar, Palash. _eeditor. _9316180 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642420320 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-42033-7 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c307702 _d307702 |