LEADER 03557nam 22008055 450 001 9910983490403321 005 20250502000546.0 010 $a9783031780172 010 $a3031780175 024 7 $a10.1007/978-3-031-78017-2 035 $a(MiAaPQ)EBC31806668 035 $a(Au-PeEL)EBL31806668 035 $a(CKB)36685697500041 035 $a(DE-He213)978-3-031-78017-2 035 $a(OCoLC)1474239204 035 $a(EXLCZ)9936685697500041 100 $a20241128d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e22nd International Conference, TCC 2024, Milan, Italy, December 2?6, 2024, Proceedings, Part II /$fedited by Elette Boyle, Mohammad Mahmoody 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (506 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15365 311 08$a9783031780165 311 08$a3031780167 327 $aProofs -- Math and Foundations -- Consensus and Messaging -- Quantum -- Kolmogorov and OWFs -- Encryption -- Quantum and Black-Box and Separations -- Authentication and Sequentiality -- Obfuscation and Homomorphism -- Multi-Party Computation -- Information-Theoretic Cryptography -- Secret Sharing. 330 $aThe four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15365 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer systems 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCryptology 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aData Structures and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 14$aCryptology. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aData Structures and Information Theory. 676 $a005.824 700 $aBoyle$b Elette$01782604 701 $aMahmoody-Ghidary$b Mohammad$f1982-$01816831 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983490403321 996 $aTheory of Cryptography$94373700 997 $aUNINA