000 | 02701nam a22003495i 4500 | ||
---|---|---|---|
001 | 319770 | ||
003 | MX-SnUAN | ||
005 | 20160429161324.0 | ||
007 | cr nn 008mamaa | ||
008 | 160111s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319174709 _9978-3-319-17470-9 |
||
035 | _avtls000420715 | ||
039 | 9 |
_y201601110950 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aInformation theoretic security : _b8th international conference, icits 2015, lugano, switzerland, may 2-5, 2015. Proceedings / _cedited by Anja Lehmann, Stefan Wolf. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2015. |
|
300 |
_axiv, 297 páginas : _b29 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9063 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aPractical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aLehmann, Anja, _eeditor. _9364174 |
|
700 | 1 |
_aWolf, Stefan, _eeditor. _9340888 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319174693 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-17470-9 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c319770 _d319770 |