Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Computer networks --- Data encryption (Computer science) --- Security measures
Choose an application
Cryptography --- Computer security --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Seguretat informàtica --- Cadena de blocs (Bases de dades)
Choose an application
Choose an application
Data encryption (Computer science) --- Computer security --- Cryptography --- Xifratge (Informàtica) --- Seguretat informàtica
Choose an application
Cryptography --- Computer security --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Seguretat informàtica
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Cryptography. --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Application software. --- Computer networks. --- Cryptology. --- Coding and Information Theory. --- Computer and Information Systems Applications. --- Computer Communication Networks. --- Computer security --- Data encryption (Computer science)
Choose an application
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .
Data protection. --- Data structures (Computer science). --- Information theory. --- Operating systems (Computers). --- Application software. --- Cryptography. --- Data encryption (Computer science). --- Data and Information Security. --- Data Structures and Information Theory. --- Operating Systems. --- Computer and Information Systems Applications. --- Cryptology. --- Security Services. --- Mathematics --- Data structures (Computer science) --- Operating systems (Computers) --- Data encryption (Computer science)
Choose an application
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- informatica --- informatietechnologie --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- informatietheorie
Choose an application
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
Ergodic theory. Information theory --- Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- cryptografie --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
Ergodic theory. Information theory --- Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- cryptografie --- applicatiebeheer --- apps --- informatica --- software engineering --- computernetwerken --- architectuur (informatica) --- informatietheorie
Listing 1 - 10 of 21 | << page >> |
Sort by
|