LEADER 03646nam 22008055 450 001 9910728385803321 005 20251225205339.0 010 $a9783031334917 010 $a3031334914 024 7 $a10.1007/978-3-031-33491-7 035 $a(MiAaPQ)EBC30553130 035 $a(Au-PeEL)EBL30553130 035 $a(OCoLC)1380721834 035 $a(DE-He213)978-3-031-33491-7 035 $a(BIP)091206239 035 $a(PPN)270612408 035 $a(CKB)26784648200041 035 $a(EXLCZ)9926784648200041 100 $a20230527d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e21st International Conference, ACNS 2023, Kyoto, Japan, June 19?22, 2023, Proceedings, Part II /$fedited by Mehdi Tibouchi, XiaoFeng Wang 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (735 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13906 311 08$aPrint version: Tibouchi, Mehdi Applied Cryptography and Network Security Cham : Springer,c2023 9783031334900 320 $aIncludes bibliographical references and index. 327 $aEmbedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain. 330 $aThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13906 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aOperating systems (Computers) 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aOperating Systems 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aSecurity Services 615 0$aData protection. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aOperating systems (Computers) 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aOperating Systems. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a005.8 676 $a005.8 702 $aTibouchi$b Mehdi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910728385803321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA