LEADER 03694nam 22007335 450 001 9910983485703321 005 20251225183443.0 010 $a9789819608751 010 $a9819608759 024 7 $a10.1007/978-981-96-0875-1 035 $a(CKB)36959338600041 035 $a(MiAaPQ)EBC31824047 035 $a(Au-PeEL)EBL31824047 035 $a(DE-He213)978-981-96-0875-1 035 $a(OCoLC)1478701009 035 $a(EXLCZ)9936959338600041 100 $a20241209d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2024 $e30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9?13, 2024, Proceedings, Part I /$fedited by Kai-Min Chung, Yu Sasaki 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (510 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15484 311 08$a9789819608744 311 08$a9819608740 327 $aAdvances Primitives -- homomorphic encryption -- digital signatures. 330 $aThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9?13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verfiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15484 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aMobile and Network Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 676 $a005.824 700 $aChung$b Kai-Min$01782610 701 $aSasaki$b Yu$01695891 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983485703321 996 $aAdvances in Cryptology ? ASIACRYPT 2024$94309018 997 $aUNINA