Atjaunināt sīkdatņu piekrišanu

Advances in Cryptology EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 June 3, 2022, Proceedings, Part I 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 823 pages, height x width: 235x155 mm, weight: 1288 g, 94 Illustrations, black and white; XXIX, 823 p. 94 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13275
  • Izdošanas datums: 29-May-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031069439
  • ISBN-13: 9783031069437
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 109,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 128,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 823 pages, height x width: 235x155 mm, weight: 1288 g, 94 Illustrations, black and white; XXIX, 823 p. 94 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13275
  • Izdošanas datums: 29-May-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031069439
  • ISBN-13: 9783031069437
Citas grāmatas par šo tēmu:
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May 3 June, 2022.





The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows:





Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation;





Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems





Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.