TY - BOOK ID - 119280525 TI - Applied Cryptography and Network Security AU - Tibouchi, Mehdi AU - Wang, Xiaofeng AU - SpringerLink (Online service) PY - 2023 SN - 9783031334917 PB - Cham Springer Nature Switzerland :Imprint: Springer DB - UniCat KW - Data protection. KW - Data structures (Computer science). KW - Information theory. KW - Operating systems (Computers). KW - Application software. KW - Cryptography. KW - Data encryption (Computer science). KW - Data and Information Security. KW - Data Structures and Information Theory. KW - Operating Systems. KW - Computer and Information Systems Applications. KW - Cryptology. KW - Security Services. KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - Cryptanalysis KW - Cryptology KW - Secret writing KW - Steganography KW - Signs and symbols KW - Symbolism KW - Writing KW - Ciphers KW - Data encryption (Computer science) KW - Application computer programs KW - Application computer software KW - Applications software KW - Apps (Computer software) KW - Computer software KW - Computer operating systems KW - Computers KW - Disk operating systems KW - Systems software KW - Communication theory KW - Communication KW - Cybernetics KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - Electronic data processing KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Operating systems KW - Mathematics KW - Computer networks KW - Security measures UR - https://www.unicat.be/uniCat?func=search&query=sysid:119280525 AB - The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. . ER -