TY - BOOK AU - Reyzin,Leonid AU - Stebila,Douglas ED - SpringerLink (Online service) TI - Advances in Cryptology - CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part V T2 - Lecture Notes in Computer Science, SN - 9783031683886 AV - QA268 U1 - 005.824 23 PY - 2024/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Cryptography KW - Data encryption (Computer science) KW - Computer engineering KW - Computer networks  KW - Computer networks KW - Security measures KW - Coding theory KW - Information theory KW - Cryptology KW - Computer Engineering and Networks KW - Mobile and Network Security KW - Coding and Information Theory KW - Computer Communication Networks N1 - Digital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments N2 - The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-68388-6 ER -