000
|
|
nam5i |
001
|
|
2210080935530 |
003
|
|
DE-He213 |
005
|
|
20250321105608 |
007
|
|
cr nn 008mamaa |
008
|
|
241212s2025 si | s |||| 0|eng d |
020
|
|
▼a9789819608911▼9978-981-96-0891-1 |
024
|
|
▼a10.1007/978-981-96-0891-1▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA268 |
072
|
|
▼aGPJ▼2bicssc |
072
|
|
▼aURY▼2bicssc |
072
|
|
▼aCOM083000▼2bisacsh |
072
|
|
▼aGPJ▼2thema |
072
|
|
▼aURY▼2thema |
082
|
|
▼a005.824▼223 |
245
|
00 |
▼aAdvances in Cryptology – ASIACRYPT 2024▼h[electronic resource] :▼b30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part III /▼cedited by Kai-Min Chung, Yu Sasaki. |
250
|
|
▼a1st ed. 2025. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2025. |
300
|
|
▼aXVIII, 496 p. 59 illus., 15 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15486 |
505
|
|
▼apairing-based cryptography, threshold cryptography -- isogeny-based cryptography -- post-quantum cryptography. |
520
|
|
▼aThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography. |
650
|
|
▼aCryptography. |
650
|
|
▼aData encryption (Computer science). |
650
|
|
▼aComputer networks . |
650
|
|
▼aApplication software. |
650
|
|
▼aData protection. |
650
|
|
▼aComputer networks▼xSecurity measures. |
650
|
|
▼aCryptology. |
650
|
|
▼aComputer Communication Networks. |
650
|
|
▼aComputer and Information Systems Applications. |
650
|
|
▼aSecurity Services. |
650
|
|
▼aMobile and Network Security. |
700
|
|
▼aChung, Kai-Min.▼eeditor.▼0(orcid)0000-0002-3356-369X▼1https://orcid.org/0000-0002-3356-369X▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aSasaki, Yu.▼eeditor.▼0(orcid)0000-0002-1273-2394▼1https://orcid.org/0000-0002-1273-2394▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819608904 |
776
|
|
▼iPrinted edition:▼z9789819608928 |
830
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15486 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-96-0891-1 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
912
|
|
▼aZDB-2-LNC |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |