Atjaunināt sīkdatņu piekrišanu

Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 1922, 2023, Proceedings, Part I 1st ed. 2023 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 751 pages, height x width: 235x155 mm, weight: 1169 g, 118 Illustrations, color; 39 Illustrations, black and white; XXIII, 751 p. 157 illus., 118 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13905
  • Izdošanas datums: 29-May-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031334876
  • ISBN-13: 9783031334870
  • Mīkstie vāki
  • Cena: 109,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 128,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 751 pages, height x width: 235x155 mm, weight: 1169 g, 118 Illustrations, color; 39 Illustrations, black and white; XXIII, 751 p. 157 illus., 118 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13905
  • Izdošanas datums: 29-May-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031334876
  • ISBN-13: 9783031334870
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.





The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows:





Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes.





Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.





 

Side-channel and fault attacks.- Symmetric cryptanalysis.- Web security.- Elliptic curves and pairings.- Homomorphic cryptography.- Machine learning.- Lattices and codes.