Advances in Cryptology ? ASIACRYPT 2024 - Chung, Kai-Min; Sasaki, Yu; (ed.) - Prospero Internet Bookshop

 
Product details:

ISBN13:9789819609437
ISBN10:9819609437
Binding:Paperback
No. of pages:431 pages
Size:235x155 mm
Language:English
Illustrations: 32 Illustrations, black & white; 25 Illustrations, color
679
Category:

Advances in Cryptology ? ASIACRYPT 2024

30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9?13, 2024, Proceedings. Part VIII
 
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 79.17
Estimated price in HUF:
34 415 HUF (32 776 HUF + 5% VAT)
Why estimated?
 
Your price:

31 662 (30 154 HUF + 5% VAT )
discount is: 8% (approx 2 753 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
Long description:

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9?13, 2024.



The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

Table of Contents:

Cryptanalyasis on Pubilc-Key Schemes.- Fault Attacks and Side-Channel Analysis.- Cryptanalysis on Various Problems.- Quantum Cryptanalysis.