Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: Code-based Cryptography Workshop Darmstadt (VerfasserIn)
Weitere Verfasser: Baldi, Marco (HerausgeberIn), Persichetti, Edoardo (HerausgeberIn), Santini, Paolo (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2019]
Cham
Schriftenreihe:Lecture notes in computer science 11666 : Security and cryptology
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV046083718
003 DE-604
005 20190814
007 cr|uuu---uuuuu
008 190802s2019 xx a||| o|||| 10||| eng d
020 |a 9783030259228  |c Online  |9 978-3-030-25922-8 
024 7 |a 10.1007/978-3-030-25922-8  |2 doi 
035 |a (ZDB-2-SCS)9783030259228 
035 |a (ZDB-2-LNC)9783030259228 
035 |a (OCoLC)1111862172 
035 |a (DE-599)BVBBV046083718 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.82  |2 23 
084 |a DAT 000  |2 stub 
111 2 |a Code-based Cryptography Workshop  |n 7.  |d 2019  |c Darmstadt  |j Verfasser  |0 (DE-588)1192245776  |4 aut 
245 1 0 |a Code-based cryptography  |b 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers  |c Marco Baldi, Edoardo Persichetti, Paolo Santini (Eds.) 
264 1 |a Cham  |b Springer  |c [2019] 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (149 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 11666  |a Security and cryptology 
650 4 |a Cryptology 
650 4 |a Computer Systems Organization and Communication Networks 
650 4 |a Coding and Information Theory 
650 4 |a Symbolic and Algebraic Manipulation 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer network architectures 
650 4 |a Coding theory 
650 4 |a Algebra / Data processing 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
700 1 |a Baldi, Marco  |4 edt 
700 1 |a Persichetti, Edoardo  |4 edt 
700 1 |a Santini, Paolo  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-25921-1 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-25923-5 
830 0 |a Lecture notes in computer science  |v 11666 : Security and cryptology  |w (DE-604)BV014880109  |9 11666 
856 4 0 |u https://doi.org/10.1007/978-3-030-25922-8  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2019 
940 1 |q ZDB-2-LNC_2019 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031464775 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2019  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-25922-8  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2422166
DE-BY-UBM_katkey 5782088
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-030-25922-8
DE-BY-UBR_katkey 6152165
_version_ 1823056843929288704
adam_text
any_adam_object
author2 Baldi, Marco
Persichetti, Edoardo
Santini, Paolo
author2_role edt
edt
edt
author2_variant m b mb
e p ep
p s ps
author_corporate Code-based Cryptography Workshop Darmstadt
author_corporate_role aut
author_facet Baldi, Marco
Persichetti, Edoardo
Santini, Paolo
Code-based Cryptography Workshop Darmstadt
author_sort Code-based Cryptography Workshop Darmstadt
building Verbundindex
bvnumber BV046083718
classification_rvk SS 4800
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030259228
(ZDB-2-LNC)9783030259228
(OCoLC)1111862172
(DE-599)BVBBV046083718
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-25922-8
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV046083718</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190814</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190802s2019 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030259228</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-25922-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-25922-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030259228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030259228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111862172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046083718</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Code-based Cryptography Workshop</subfield><subfield code="n">7.</subfield><subfield code="d">2019</subfield><subfield code="c">Darmstadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1192245776</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Code-based cryptography</subfield><subfield code="b">7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers</subfield><subfield code="c">Marco Baldi, Edoardo Persichetti, Paolo Santini (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (149 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11666</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Symbolic and Algebraic Manipulation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algebra / Data processing</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baldi, Marco</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Persichetti, Edoardo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santini, Paolo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-25921-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-25923-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11666 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">11666</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2019</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2019</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031464775</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2019</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-25922-8</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV046083718
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1192245776
isbn 9783030259228
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031464775
oclc_num 1111862172
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (149 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2019
ZDB-2-LNC_2019
ZDB-2-LNC ZDB-2-LNC_2019
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers
Lecture notes in computer science
Cryptology
Computer Systems Organization and Communication Networks
Coding and Information Theory
Symbolic and Algebraic Manipulation
Data encryption (Computer science)
Computer network architectures
Coding theory
Algebra / Data processing
subject_GND (DE-588)1071861417
title Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers
title_auth Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers
title_exact_search Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers
title_full Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers Marco Baldi, Edoardo Persichetti, Paolo Santini (Eds.)
title_fullStr Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers Marco Baldi, Edoardo Persichetti, Paolo Santini (Eds.)
title_full_unstemmed Code-based cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers Marco Baldi, Edoardo Persichetti, Paolo Santini (Eds.)
title_short Code-based cryptography
title_sort code based cryptography 7th international workshop cbc 2019 darmstadt germany may 18 19 2019 revised selected papers
title_sub 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019 : revised selected papers
topic Cryptology
Computer Systems Organization and Communication Networks
Coding and Information Theory
Symbolic and Algebraic Manipulation
Data encryption (Computer science)
Computer network architectures
Coding theory
Algebra / Data processing
topic_facet Cryptology
Computer Systems Organization and Communication Networks
Coding and Information Theory
Symbolic and Algebraic Manipulation
Data encryption (Computer science)
Computer network architectures
Coding theory
Algebra / Data processing
Konferenzschrift
url https://doi.org/10.1007/978-3-030-25922-8
volume_link (DE-604)BV014880109
work_keys_str_mv AT codebasedcryptographyworkshopdarmstadt codebasedcryptography7thinternationalworkshopcbc2019darmstadtgermanymay18192019revisedselectedpapers
AT baldimarco codebasedcryptography7thinternationalworkshopcbc2019darmstadtgermanymay18192019revisedselectedpapers
AT persichettiedoardo codebasedcryptography7thinternationalworkshopcbc2019darmstadtgermanymay18192019revisedselectedpapers
AT santinipaolo codebasedcryptography7thinternationalworkshopcbc2019darmstadtgermanymay18192019revisedselectedpapers