LEADER 03659nam 22008055 450 001 9910728398903321 005 20230528170824.0 010 $a3-031-33488-4 024 7 $a10.1007/978-3-031-33488-7 035 $a(MiAaPQ)EBC30553702 035 $a(Au-PeEL)EBL30553702 035 $a(OCoLC)1380721675 035 $a(DE-He213)978-3-031-33488-7 035 $a(BIP)091206107 035 $a(PPN)270612416 035 $a(CKB)26795839900041 035 $a(EXLCZ)9926795839900041 100 $a20230528d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e21st International Conference, ACNS 2023, Kyoto, Japan, June 19?22, 2023, Proceedings, Part I /$fedited by Mehdi Tibouchi, XiaoFeng Wang 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (762 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13905 311 08$aPrint version: Tibouchi, Mehdi Applied Cryptography and Network Security Cham : Springer,c2023 9783031334870 327 $aSide-channel and fault attacks -- Symmetric cryptanalysis -- Web security -- Elliptic curves and pairings -- Homomorphic cryptography -- Machine learning -- Lattices and codes. 330 $aThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13905 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aOperating systems (Computers) 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aOperating Systems 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aSecurity Services 610 $aMathematics 615 0$aData protection. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aOperating Systems. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a005.8 676 $a005.8 700 $aTibouchi$b Mehdi$01358933 701 $aWang$b Xiaofeng$01358934 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910728398903321 996 $aApplied Cryptography and Network Security$93371745 997 $aUNINA