LEADER 00844nas 2200253 450 001 000026901 005 20091210174455.0 011 $a0374-5686 100 $a20091202a1969----km-y0itay50------ba 101 0 $amul 102 $aBR 110 $aaj-----0--- 200 1 $aArquivos de Ciencias do mar$fLaboratorio de Ciencias do mar da Universidade Federal do Ceara 210 $aFortaleza$cLaboratorio de Ciencias do mar da Universidade Federal do Ceara$d1969- 215 $afascicoli 326 $aSemestrale 430 0$1001000026902 610 1 $aOceanologia 712 02$aLaboratorio de Ciencias do mar da Universidade Federal do Ceara 801 0$aIT$bUNIPARTHENOPE$gRICA$2UNIMARC 912 $a000026901 958 $a1969-1982; 1984-1990; 1994-1996; 1998-1999$cDISAM 996 $aArquivos de Ciencias do mar$91211572 997 $aUNIPARTHENOPE LEADER 02628nam 2200469 450 001 996574258203316 005 20240113235842.0 010 $a9789819987429 024 7 $a10.1007/978-981-99-8742-9 035 $a(CKB)29437161200041 035 $a(MiAaPQ)EBC31028023 035 $a(Au-PeEL)EBL31028023 035 $a(DE-He213)978-981-99-8742-9 035 $a(EXLCZ)9929437161200041 100 $a20240113d2023 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAdvances in Cryptology - ASIACRYPT 2023 $e29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII /$fedited by Jian Guo and Ron Steinfeld 205 $aFirst edition. 210 1$aSingapore :$cSpringer,$d[2023] 210 4$dİ2023 215 $a1 online resource (342 pages) 225 1 $aLecture Notes in Computer Science Series ;$vVolume 14445 311 08$a9789819987412 320 $aIncludes bibliographical references and index. 327 $aQuantum cryptography -- key exchange -- symmetric-key design. 330 $aThe eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design. 410 0$aLecture notes in computer science ;$vVolume 14445. 606 $aComputers 615 0$aComputers. 676 $a929.605 702 $aGuo$b Jian 702 $aSteinfeld$b Ron 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996574258203316 996 $aAdvances in Cryptology - ASIACRYPT 2023$93870048 997 $aUNISA