소장자료

>>
소장자료
>
000 nam5i
001 2210080935530
003 DE-He213
005 20250321105608
007 cr nn 008mamaa
008 241212s2025 si | s |||| 0|eng d
020 a97898196089119978-981-96-0891-1
024 a10.1007/978-981-96-0891-12doi
040 a221008
050 aQA268
072 aGPJ2bicssc
072 aURY2bicssc
072 aCOM0830002bisacsh
072 aGPJ2thema
072 aURY2thema
082 a005.824223
245 00 aAdvances in Cryptology – ASIACRYPT 2024h[electronic resource] :b30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part III /cedited by Kai-Min Chung, Yu Sasaki.
250 a1st ed. 2025.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2025.
300 aXVIII, 496 p. 59 illus., 15 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aLecture Notes in Computer Science,x1611-3349 ;v15486
505 apairing-based cryptography, threshold cryptography -- isogeny-based cryptography -- post-quantum cryptography.
520 aThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
650 aCryptography.
650 aData encryption (Computer science).
650 aComputer networks .
650 aApplication software.
650 aData protection.
650 aComputer networksxSecurity measures.
650 aCryptology.
650 aComputer Communication Networks.
650 aComputer and Information Systems Applications.
650 aSecurity Services.
650 aMobile and Network Security.
700 aChung, Kai-Min.eeditor.0(orcid)0000-0002-3356-369X1https://orcid.org/0000-0002-3356-369X4edt4http://id.loc.gov/vocabulary/relators/edt
700 aSasaki, Yu.eeditor.0(orcid)0000-0002-1273-23941https://orcid.org/0000-0002-1273-23944edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819608904
776 iPrinted edition:z9789819608928
830 aLecture Notes in Computer Science,x1611-3349 ;v15486
856 uhttps://doi.org/10.1007/978-981-96-0891-1
912 aZDB-2-SCS
912 aZDB-2-SXCS
912 aZDB-2-LNC
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Advances in Cryptology – ASIACRYPT 2024[electronic resource] :30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part III /edited by Kai-Min Chung, Yu Sasaki
종류
전자책
서명
Advances in Cryptology – ASIACRYPT 2024[electronic resource] :30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part III /edited by Kai-Min Chung, Yu Sasaki
저자명
판 사항
1st ed. 2025.
형태사항
XVIII, 496 p 59 illus, 15 illus in color online resource.
주기사항
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기