000 | 04106nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-68388-6 | ||
003 | DE-He213 | ||
005 | 20250516160121.0 | ||
007 | cr nn 008mamaa | ||
008 | 240816s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031683886 _9978-3-031-68388-6 |
||
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - CRYPTO 2024 _h[electronic resource] : _b44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part V / _cedited by Leonid Reyzin, Douglas Stebila. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXXII, 489 p. 50 illus., 15 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14924 |
|
505 | 0 | _aDigital signatures -- Cloud cryptography -- Consensus protocols -- Key exchange -- Public key encryption -- Public-key cryptography with advanced functionalities -- Time-lock cryptography -- Symmetric cryptanalysis -- Symmetric cryptograph -- Mathematical assumptions -- Secret sharing -- Theoretical foundations -- Cryptanalysis -- New primitives -- Side-channels and leakage -- Quantum cryptography -- Threshold cryptography -- Multiparty computation -- Private information retrieval -- Zero-knowledge -- Succinct arguments. | |
520 | _aThe 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. . | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aReyzin, Leonid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aStebila, Douglas. _eeditor. _0(orcid)0000-0001-9443-3170 _1https://orcid.org/0000-0001-9443-3170 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031683879 |
776 | 0 | 8 |
_iPrinted edition: _z9783031683893 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14924 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-68388-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cLIBRO_ELEC | ||
999 |
_c276042 _d276041 |