LEADER 03085nam 22006735 450 001 9910767524103321 005 20240701120645.0 010 $a3-031-47818-5 024 7 $a10.1007/978-3-031-47818-5 035 $a(MiAaPQ)EBC30985608 035 $a(Au-PeEL)EBL30985608 035 $a(DE-He213)978-3-031-47818-5 035 $a(CKB)29250254900041 035 $a(EXLCZ)9929250254900041 100 $a20231109d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography and Coding $e19th IMA International Conference, IMACC 2023, London, UK, December 12?14, 2023, Proceedings /$fedited by Elizabeth A. Quaglia 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (286 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14421 311 08$aPrint version: Quaglia, Elizabeth A. Cryptography and Coding Cham : Springer,c2023 9783031478178 320 $aIncludes bibliographical references and index. 327 $aCoding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions. 330 $aThis book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12?14, 2023 The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14421 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aCryptology 606 $aData Structures and Information Theory 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 676 $a652.8 702 $aQuaglia$b Elizabeth A. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910767524103321 996 $aCryptography and Coding$93655583 997 $aUNINA