Atjaunināt sīkdatņu piekrišanu

Advances in Cryptology EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV 1st ed. 2023 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 660 pages, height x width: 235x155 mm, weight: 1027 g, 75 Illustrations, color; 85 Illustrations, black and white; XVII, 660 p. 160 illus., 75 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14007
  • Izdošanas datums: 16-Apr-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031306333
  • ISBN-13: 9783031306334
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 100,46 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 118,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 660 pages, height x width: 235x155 mm, weight: 1027 g, 75 Illustrations, color; 85 Illustrations, black and white; XVII, 660 p. 160 illus., 75 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14007
  • Izdošanas datums: 16-Apr-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031306333
  • ISBN-13: 9783031306334
Citas grāmatas par šo tēmu:
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.

The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.