Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.

The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:  

Part I: Secure Multi-party computation; threshold cryptography; .  

Part II: proof systems - succinctness and foundations; anonymity; 

Part III: quantum cryptanalysis; symmetric-key cryptanalysis; 

Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; 

Part V: functional encryption, commitments and proofs; secure messaging and broadcast; 

Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; 

Part VII: post-quantum cryptography; 

Part VIII: quantum cryptography; key exchange; symmetric-key design.

1144332918
Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.

The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:  

Part I: Secure Multi-party computation; threshold cryptography; .  

Part II: proof systems - succinctness and foundations; anonymity; 

Part III: quantum cryptanalysis; symmetric-key cryptanalysis; 

Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; 

Part V: functional encryption, commitments and proofs; secure messaging and broadcast; 

Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; 

Part VII: post-quantum cryptography; 

Part VIII: quantum cryptography; key exchange; symmetric-key design.

79.99 In Stock
Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV

Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV

Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV

Advances in Cryptology - ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV

eBook1st ed. 2023 (1st ed. 2023)

$79.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.

The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:  

Part I: Secure Multi-party computation; threshold cryptography; .  

Part II: proof systems - succinctness and foundations; anonymity; 

Part III: quantum cryptanalysis; symmetric-key cryptanalysis; 

Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; 

Part V: functional encryption, commitments and proofs; secure messaging and broadcast; 

Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; 

Part VII: post-quantum cryptography; 

Part VIII: quantum cryptography; key exchange; symmetric-key design.


Product Details

ISBN-13: 9789819987306
Publisher: Springer-Verlag New York, LLC
Publication date: 12/17/2023
Series: Lecture Notes in Computer Science , #14441
Sold by: Barnes & Noble
Format: eBook
File size: 52 MB
Note: This product may take a few minutes to download.

Table of Contents

Cryptanalysis of post-quantum and public-key systems.- side-channels.- quantum random oracle model.
From the B&N Reads Blog

Customer Reviews