Listing 1 - 10 of 26 | << page >> |
Sort by
|
Choose an application
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Application software. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Computer security --- Cryptography --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Computer security --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Application software. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Application software. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- mobiele communicatie --- netwerk management --- Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Application software. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Data encryption (Computer science)
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Application software. --- Data protection. --- Computer networks --- Cryptology. --- Computer Communication Networks. --- Computer and Information Systems Applications. --- Security Services. --- Mobile and Network Security. --- Security measures. --- Data encryption (Computer science)
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management
Choose an application
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management --- Computers.
Listing 1 - 10 of 26 | << page >> |
Sort by
|