|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910728398903321 |
|
|
Autore |
Tibouchi Mehdi |
|
|
Titolo |
Applied Cryptography and Network Security : 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I / / edited by Mehdi Tibouchi, XiaoFeng Wang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (762 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 13905 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Data structures (Computer science) |
Information theory |
Operating systems (Computers) |
Application software |
Cryptography |
Data encryption (Computer science) |
Data and Information Security |
Data Structures and Information Theory |
Operating Systems |
Computer and Information Systems Applications |
Cryptology |
Security Services |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Side-channel and fault attacks -- Symmetric cryptanalysis -- Web security -- Elliptic curves and pairings -- Homomorphic cryptography -- Machine learning -- Lattices and codes. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: |
|
|
|
|
|
|
|
|
|
|
side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. . |
|
|
|
|
|
| |