000 | 03403nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-99-8733-7 | ||
003 | DE-He213 | ||
005 | 20240730203139.0 | ||
007 | cr nn 008mamaa | ||
008 | 231217s2023 si | s |||| 0|eng d | ||
020 |
_a9789819987337 _9978-981-99-8733-7 |
||
024 | 7 |
_a10.1007/978-981-99-8733-7 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - ASIACRYPT 2023 _h[electronic resource] : _b29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V / _cedited by Jian Guo, Ron Steinfeld. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2023. |
|
300 |
_aXVIII, 443 p. 62 illus., 9 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14442 |
|
520 | _aThe eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9174671 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aGuo, Jian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9174672 |
|
700 | 1 |
_aSteinfeld, Ron. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9174673 |
|
710 | 2 |
_aSpringerLink (Online service) _9174674 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819987320 |
776 | 0 | 8 |
_iPrinted edition: _z9789819987344 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14442 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-8733-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c97361 _d97361 |