03557nam 22008055 450 991098349040332120250502000546.09783031780172303178017510.1007/978-3-031-78017-2(MiAaPQ)EBC31806668(Au-PeEL)EBL31806668(CKB)36685697500041(DE-He213)978-3-031-78017-2(OCoLC)1474239204(EXLCZ)993668569750004120241128d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierTheory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part II /edited by Elette Boyle, Mohammad Mahmoody1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (506 pages)Lecture Notes in Computer Science,1611-3349 ;153659783031780165 3031780167 Proofs -- Math and Foundations -- Consensus and Messaging -- Quantum -- Kolmogorov and OWFs -- Encryption -- Quantum and Black-Box and Separations -- Authentication and Sequentiality -- Obfuscation and Homomorphism -- Multi-Party Computation -- Information-Theoretic Cryptography -- Secret Sharing.The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.Lecture Notes in Computer Science,1611-3349 ;15365CryptographyData encryption (Computer science)Data protectionComputer networksSecurity measuresComputer networksComputer systemsData structures (Computer science)Information theoryCryptologySecurity ServicesMobile and Network SecurityComputer Communication NetworksComputer System ImplementationData Structures and Information TheoryCryptography.Data encryption (Computer science)Data protection.Computer networksSecurity measures.Computer networks.Computer systems.Data structures (Computer science)Information theory.Cryptology.Security Services.Mobile and Network Security.Computer Communication Networks.Computer System Implementation.Data Structures and Information Theory.005.824Boyle Elette1782604Mahmoody-Ghidary Mohammad1982-1816831MiAaPQMiAaPQMiAaPQBOOK9910983490403321Theory of Cryptography4373700UNINA