04106nam 22007335 450 991088108760332120240909110946.09783031683947(electronic bk.)978303168393010.1007/978-3-031-68394-7(MiAaPQ)EBC31606757(Au-PeEL)EBL31606757(CKB)34075068700041(DE-He213)978-3-031-68394-7(EXLCZ)993407506870004120240817d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2024 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part VII /edited by Leonid Reyzin, Douglas Stebila1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (511 pages)Lecture Notes in Computer Science,1611-3349 ;14926Print version: Reyzin, Leonid Advances in Cryptology - CRYPTO 2024 Cham : Springer,c2024 9783031683930 Includes bibliographical references and index.Digital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments.The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. .Lecture Notes in Computer Science,1611-3349 ;14926CryptographyData encryption (Computer science)Computer engineeringComputer networksComputer networksSecurity measuresCoding theoryInformation theoryCryptologyComputer Engineering and NetworksMobile and Network SecurityCoding and Information TheoryComputer Communication NetworksCryptography.Data encryption (Computer science).Computer engineering.Computer networks.Computer networksSecurity measures.Coding theory.Information theory.Cryptology.Computer Engineering and Networks.Mobile and Network Security.Coding and Information Theory.Computer Communication Networks.005.8Reyzin LeonidStebila DouglasMiAaPQMiAaPQMiAaPQ9910881087603321Advances in Cryptology – CRYPTO 20244230512UNINA