01205nam--2200409---450-99000078637020331620090611153320.088-244-9661-X0078637USA010078637(ALEPH)000078637USA01007863720011204d2001----km-y0itay0103----baitaITy|||n|||001yy<<La>> privacyguida alla applicazione della legge 675/1996Tiziana Minella2. edNapoliEdizioni Giuridiche Simone2001654 p.24 cmL33/12001L33/1Diritto alla riservatezza342.450858MINELLA,Tiziana464792ITsalbcISBD990000786370203316XXIV.2.D 33 (IG V 758)31854 G.XXIV.2.D 33 (IG V)00078938BKgiuALESSANDRA9020011204USA011028ALESSANDRA9020011204USA01102820020403USA011725PATRY9020040406USA011654RSIAV59020090611USA011533Privacy207291UNISA03938nam 22008055 450 99663566940331620250618142943.09789819608751981960875910.1007/978-981-96-0875-1(CKB)36959338600041(MiAaPQ)EBC31824047(Au-PeEL)EBL31824047(DE-He213)978-981-96-0875-1(OCoLC)1478701009(EXLCZ)993695933860004120241209d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part I /edited by Kai-Min Chung, Yu Sasaki1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (510 pages)Lecture Notes in Computer Science,1611-3349 ;154849789819608744 9819608740 Advances Primitives -- homomorphic encryption -- digital signatures.The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verfiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography. .Lecture Notes in Computer Science,1611-3349 ;15484CryptographyData encryption (Computer science)Computer networksApplication softwareData protectionComputer networksSecurity measuresCryptologyComputer Communication NetworksComputer and Information Systems ApplicationsSecurity ServicesMobile and Network SecurityXifratge (Informàtica)thubSeguretat informàticathubCongressosthubLlibres electrònicsthubCryptography.Data encryption (Computer science)Computer networks.Application software.Data protection.Computer networksSecurity measures.Cryptology.Computer Communication Networks.Computer and Information Systems Applications.Security Services.Mobile and Network Security.Xifratge (Informàtica)Seguretat informàtica005.824Chung Kai-Min1782610Sasaki Yu1695891MiAaPQMiAaPQMiAaPQBOOK996635669403316Advances in Cryptology – ASIACRYPT 20244309018UNISA