TY - BOOK AU - Robshaw,Matthew AU - Katz,Jonathan ED - SpringerLink (Online service) TI - Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III T2 - Security and Cryptology SN - 9783662530153 AV - QA76.9.D335 U1 - 005.82 23 PY - 2016/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg, Imprint: Springer KW - Data encryption (Computer science) KW - Computer security KW - Algorithms KW - Management information systems KW - Computer science KW - Computer science—Mathematics KW - Cryptology KW - Systems and Data Security KW - Algorithm Analysis and Problem Complexity KW - Management of Computing and Information Systems KW - Discrete Mathematics in Computer Science N1 - Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric cryptography -- Symmetric cryptography -- Cryptanalytic tools -- Hardware-oriented cryptography -- Secure computation and protocols -- Obfuscation -- Quantum techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis -- Zero knowledge -- Theory N2 - The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory UR - https://doi.org/10.1007/978-3-662-53015-3 ER -