000 | 03497nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-58716-0 | ||
003 | DE-He213 | ||
005 | 20240730171950.0 | ||
007 | cr nn 008mamaa | ||
008 | 240428s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031587160 _9978-3-031-58716-0 |
||
024 | 7 |
_a10.1007/978-3-031-58716-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - EUROCRYPT 2024 _h[electronic resource] : _b43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I / _cedited by Marc Joye, Gregor Leander. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXVIII, 492 p. 63 illus., 48 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14651 |
|
520 | _aThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aInformation technology _xManagement. _95368 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _9101140 |
650 | 2 | 4 |
_aComputer Application in Administrative Data Processing. _931588 |
700 | 1 |
_aJoye, Marc. _eeditor. _0(orcid) _10000-0003-4433-2333 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101142 |
|
700 | 1 |
_aLeander, Gregor. _eeditor. _0(orcid) _10000-0002-2579-8587 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101143 |
|
710 | 2 |
_aSpringerLink (Online service) _9101146 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031587153 |
776 | 0 | 8 |
_iPrinted edition: _z9783031587177 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14651 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-58716-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c87922 _d87922 |