LEADER 03919nam 22007815 450 001 9910770267703321 005 20260202111807.0 010 $a9789819987368$b(electronic bk.) 010 $z9789819987351 024 7 $a10.1007/978-981-99-8736-8 035 $a(MiAaPQ)EBC31024867 035 $a(Au-PeEL)EBL31024867 035 $a(DE-He213)978-981-99-8736-8 035 $a(OCoLC)1415897053 035 $a(CKB)29434931400041 035 $a(EXLCZ)9929434931400041 100 $a20231217d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2023 $e29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4?8, 2023, Proceedings, Part VI /$fedited by Jian Guo, Ron Steinfeld 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (466 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14443 311 08$aPrint version: Guo, Jian Advances in Cryptology - ASIACRYPT 2023 Singapore : Springer,c2024 9789819987351 327 $aHomomorphic encryption -- encryption with special functionalities -- security proofs and security models. 330 $aThe eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14443 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aMobile and Network Security 606 $aXifratge (Informātica)$2thub 606 $aSeguretat informātica$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 7$aXifratge (Informātica) 615 7$aSeguretat informātica 676 $a005.824 700 $aGuo$b Jian$01460295 701 $aSteinfeld$b Ron$01460296 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910770267703321 996 $aAdvances in Cryptology ? ASIACRYPT 2023$93660159 997 $aUNINA