Advances in Cryptology - CRYPTO 2024 [electronic resource] : 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VII / edited by Leonid Reyzin, Douglas Stebila.

Colaborador(es): Reyzin, Leonid [editor.] | Stebila, Douglas [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 14926Editor: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XXII, 493 p. 60 illus., 23 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783031683947Tema(s): Cryptography | Data encryption (Computer science) | Computer engineering | Computer networks  | Computer networks -- Security measures | Coding theory | Information theory | Cryptology | Computer Engineering and Networks | Mobile and Network Security | Coding and Information Theory | Computer Communication NetworksFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 005.824 Clasificación LoC:QA268Recursos en línea: Libro electrónicoTexto
Contenidos:
Digital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments.
En: Springer Nature eBookResumen: The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. .
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Digital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments.

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. .

UABC ; Perpetuidad

Con tecnología Koha