Advances in Cryptology - ASIACRYPT 2019 [electronic resource] : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III / edited by Steven D. Galbraith, Shiho Moriai.
Contributor(s): Galbraith, Steven D [editor.] | Moriai, Shiho [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 11923Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XV, 761 p. 1332 illus., 23 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030346188.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks | Coding theory | Information theory | Computers | Computer science -- Mathematics | Cryptology | Computer Communication Networks | Coding and Information Theory | Computing Milieux | Mathematics of ComputingAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access onlineLattices -- Symmetric Cryptography -- Isogenies -- Obfuscation -- Multiparty Computation -- Quantum -- E-cash and Blockchain -- Codes -- Authenticated Encryption -- Multilinear Maps -- Homomorphic Encryption -- Combinatorial Cryptography -- Signatures -- Public Key Encryption -- Side Channels -- Functional Encryption -- Zero Knowledge.
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
There are no comments for this item.