| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910770267703321 |
|
|
Autore |
Guo Jian |
|
|
Titolo |
Advances in Cryptology – ASIACRYPT 2023 : 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VI / / edited by Jian Guo, Ron Steinfeld |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
9789819987368 |
9789819987351 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (466 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 14443 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks |
Application software |
Data protection |
Computer networks - Security measures |
Cryptology |
Computer Communication Networks |
Computer and Information Systems Applications |
Security Services |
Mobile and Network Security |
Xifratge (Informàtica) |
Seguretat informàtica |
Congressos |
Llibres electrònics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Homomorphic encryption -- encryption with special functionalities -- security proofs and security models. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and |
|
|
|
|
|
|
|
|
|
|
Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design. |
|
|
|
|
|
| |