Listing 1 - 9 of 9 |
Sort by
|
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Computer networks --- Data encryption (Computer science) --- Security measures
Choose an application
Cryptography --- Computer security --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Seguretat informàtica --- Cadena de blocs (Bases de dades)
Choose an application
Choose an application
Data encryption (Computer science) --- Computer security --- Cryptography --- Xifratge (Informàtica) --- Seguretat informàtica
Choose an application
Cryptography --- Computer security --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Seguretat informàtica
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Cryptography. --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Application software. --- Computer networks. --- Cryptology. --- Coding and Information Theory. --- Computer and Information Systems Applications. --- Computer Communication Networks. --- Computer security --- Data encryption (Computer science)
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Data protection. --- Data structures (Computer science). --- Information theory. --- Operating systems (Computers). --- Application software. --- Cryptography. --- Data encryption (Computer science). --- Data and Information Security. --- Data Structures and Information Theory. --- Operating Systems. --- Computer and Information Systems Applications. --- Cryptology. --- Security Services. --- Mathematics --- Data structures (Computer science) --- Operating systems (Computers) --- Data encryption (Computer science)
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Data protection. --- Data structures (Computer science). --- Information theory. --- Operating systems (Computers). --- Application software. --- Cryptography. --- Data encryption (Computer science). --- Data and Information Security. --- Data Structures and Information Theory. --- Operating Systems. --- Computer and Information Systems Applications. --- Cryptology. --- Security Services. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Operating systems --- Mathematics --- Computer networks --- Security measures
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Data protection. --- Data structures (Computer science). --- Information theory. --- Operating systems (Computers). --- Application software. --- Cryptography. --- Data encryption (Computer science). --- Data and Information Security. --- Data Structures and Information Theory. --- Operating Systems. --- Computer and Information Systems Applications. --- Cryptology. --- Security Services. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Operating systems --- Mathematics
Listing 1 - 9 of 9 |
Sort by
|