Atjaunināt sīkdatņu piekrišanu

Advances in Cryptology ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 913, 2024, Proceedings. Part IV [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 451 pages, height x width: 235x155 mm, 10 Illustrations, color; 65 Illustrations, black and white; XVIII, 451 p. 75 illus., 10 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15487
  • Izdošanas datums: 14-Dec-2024
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819608937
  • ISBN-13: 9789819608935
  • Mīkstie vāki
  • Cena: 68,33 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 80,39 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 451 pages, height x width: 235x155 mm, 10 Illustrations, color; 65 Illustrations, black and white; XVIII, 451 p. 75 illus., 10 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15487
  • Izdošanas datums: 14-Dec-2024
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819608937
  • ISBN-13: 9789819608935
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 913, 2024.





The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

post-quantum cryptography.- secure data structures.- lattice-based cryptography.- lattice assumptions.