Advances in Cryptology – ASIACRYPT 2023
29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II
Seiten
2023
|
1st ed. 2023
Springer Verlag, Singapore
978-981-99-8723-8 (ISBN)
Springer Verlag, Singapore
978-981-99-8723-8 (ISBN)
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.
Proof systems - succinctness and foundations.- anonymity.
Erscheinungsdatum | 22.12.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | 7 Illustrations, color; 57 Illustrations, black and white; XVIII, 489 p. 398 illus., 7 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | anonymity • authentication • Computational Complexity • Computer Security • Cryptanalysis • cryptographic implementations • cryptographic protocols • cryptography • data privacy • Data Security • Encryption • Multi-Party Computation • Network Protocols • post-quantum cryptography • proof systems • Public Key Cryptography • quantum • Side-channels • symmetric key • Zero-knowledge |
ISBN-10 | 981-99-8723-7 / 9819987237 |
ISBN-13 | 978-981-99-8723-8 / 9789819987238 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
eine Cyberstaatsanwältin ermittelt
Buch | Hardcover (2024)
Murmann Publishers (Verlag)
CHF 34,95