Library Catalog

>>
Library Catalog
>
000 nam5i
001 2210080935526
003 DE-He213
005 20250321105608
007 cr nn 008mamaa
008 241211s2025 si | s |||| 0|eng d
020 a97898196094449978-981-96-0944-4
024 a10.1007/978-981-96-0944-42doi
040 a221008
050 aQA268
072 aGPJ2bicssc
072 aURY2bicssc
072 aCOM0830002bisacsh
072 aGPJ2thema
072 aURY2thema
082 a005.824223
245 00 aAdvances in Cryptology – ASIACRYPT 2024h[electronic resource] :b30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part VIII /cedited by Kai-Min Chung, Yu Sasaki.
250 a1st ed. 2025.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2025.
300 aXVIII, 431 p. 57 illus., 25 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aLecture Notes in Computer Science,x1611-3349 ;v15491
505 aCryptanalyasis on Pubilc-Key Schemes -- Fault Attacks and Side-Channel Analysis -- Cryptanalysis on Various Problems -- Quantum Cryptanalysis.
520 aThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
650 aCryptography.
650 aData encryption (Computer science).
650 aComputer networks .
650 aApplication software.
650 aData protection.
650 aComputer networksxSecurity measures.
650 aCryptology.
650 aComputer Communication Networks.
650 aComputer and Information Systems Applications.
650 aSecurity Services.
650 aMobile and Network Security.
700 aChung, Kai-Min.eeditor.0(orcid)0000-0002-3356-369X1https://orcid.org/0000-0002-3356-369X4edt4http://id.loc.gov/vocabulary/relators/edt
700 aSasaki, Yu.eeditor.0(orcid)0000-0002-1273-23941https://orcid.org/0000-0002-1273-23944edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819609437
776 iPrinted edition:z9789819609451
830 aLecture Notes in Computer Science,x1611-3349 ;v15491
856 uhttps://doi.org/10.1007/978-981-96-0944-4
912 aZDB-2-SCS
912 aZDB-2-SXCS
912 aZDB-2-LNC
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Advances in Cryptology – ASIACRYPT 2024[electronic resource] :30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part VIII /edited by Kai-Min Chung, Yu Sasaki
Material type
전자책
Title
Advances in Cryptology – ASIACRYPT 2024[electronic resource] :30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part VIII /edited by Kai-Min Chung, Yu Sasaki
Author's Name
판 사항
1st ed. 2025.
Physical Description
XVIII, 431 p 57 illus, 25 illus in color online resource.
Keyword
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
관련 URL

Holdings Information

RReservation
MMissing Book Request
CClosed Stack Request
IInter-Campus Loan
CPriority Cataloging
PPrint
Registration no. Call no. Location Mark Location Status Due for return Service
전자자료는 소장사항이 존재하지 않습니다

Book Overview

Full menu