LEADER 04106nam 22007335 450 001 9910881087603321 005 20240909110946.0 010 $a9783031683947$b(electronic bk.) 010 $z9783031683930 024 7 $a10.1007/978-3-031-68394-7 035 $a(MiAaPQ)EBC31606757 035 $a(Au-PeEL)EBL31606757 035 $a(CKB)34075068700041 035 $a(DE-He213)978-3-031-68394-7 035 $a(EXLCZ)9934075068700041 100 $a20240817d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? CRYPTO 2024 $e44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18?22, 2024, Proceedings, Part VII /$fedited by Leonid Reyzin, Douglas Stebila 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (511 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14926 311 08$aPrint version: Reyzin, Leonid Advances in Cryptology - CRYPTO 2024 Cham : Springer,c2024 9783031683930 320 $aIncludes bibliographical references and index. 327 $aDigital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments. 330 $aThe 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14926 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aMobile and Network Security 606 $aCoding and Information Theory 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aMobile and Network Security. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aReyzin$b Leonid 702 $aStebila$b Douglas 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910881087603321 996 $aAdvances in Cryptology ? CRYPTO 2024$94230512 997 $aUNINA