Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV / [electronic resource] :
edited by Guy Rothblum, Hoeteck Wee.
- 1st ed. 2023.
- XII, 544 p. 56 illus., 6 illus. in color. online resource.
- Lecture Notes in Computer Science, 14372 1611-3349 ; .
- Lecture Notes in Computer Science, 14372 .
Lattices -- quantum cryptography -- group-based cryptography -- Byzantine agreement, consensus and composability.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. .
9783031486241
10.1007/978-3-031-48624-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Computer systems.
Data structures (Computer science).
Information theory.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
Data Structures and Information Theory.
QA268
005.824
Lattices -- quantum cryptography -- group-based cryptography -- Byzantine agreement, consensus and composability.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. .
9783031486241
10.1007/978-3-031-48624-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Computer systems.
Data structures (Computer science).
Information theory.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
Data Structures and Information Theory.
QA268
005.824