Update cookies preferences

E-book: Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II

Edited by , Edited by
  • Format: EPUB+DRM
  • Series: Lecture Notes in Computer Science 13906
  • Pub. Date: 27-May-2023
  • Publisher: Springer International Publishing AG
  • Language: eng
  • ISBN-13: 9783031334917
  • Format - EPUB+DRM
  • Price: 122,88 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: EPUB+DRM
  • Series: Lecture Notes in Computer Science 13906
  • Pub. Date: 27-May-2023
  • Publisher: Springer International Publishing AG
  • Language: eng
  • ISBN-13: 9783031334917

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.





The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows:





Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes.





Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.





 

Embedded security.- Privacy-preserving protocols.- Isogeny-based cryptography.- Encryption.- Advanced primitives.- Multiparty computation.- Blockchain.