Progress in Cryptology – INDOCRYPT 2023
Author: Anupam Chattopadhyay
Publisher: Springer Nature
Published:
Total Pages: 277
ISBN-13: 3031562356
DOWNLOAD EBOOKRead and Download eBook Full
Author: Anupam Chattopadhyay
Publisher: Springer Nature
Published:
Total Pages: 277
ISBN-13: 3031562356
DOWNLOAD EBOOKAuthor: Anupam Chattopadhyay
Publisher: Springer Nature
Published:
Total Pages: 364
ISBN-13: 3031562321
DOWNLOAD EBOOKAuthor: Anupam Chattopadhyay
Publisher: Springer
Published: 2024-04-28
Total Pages: 0
ISBN-13: 9783031562341
DOWNLOAD EBOOKThe two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryptology, INDOCRYPT 2023, Goa, India, in December 2023. The 26 full papers were carefully reviewed and selected from 74 submissions. They are organized in topical sections as follows: Part One: Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes; Elliptic curves, Zero-knowledge proof, Signatures; Attacks. Part Two: Secure computation, Algorithm hardness, Privacy; Post-quantum cryptography.
Author: Anupam Chattopadhyay
Publisher: Springer
Published: 2024-04-28
Total Pages: 0
ISBN-13: 9783031562310
DOWNLOAD EBOOKThe two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryptology, INDOCRYPT 2023, Goa, India, in December 2023. The 26 full papers were carefully reviewed and selected from 74 submissions. They are organized in topical sections as follows: Part One: Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes; Elliptic curves, Zero-knowledge proof, Signatures; Attacks. Part Two: Secure computation, Algorithm hardness, Privacy; Post-quantum cryptography.
Author:
Publisher:
Published: 2000
Total Pages:
ISBN-13:
DOWNLOAD EBOOKAuthor: Abdelrahaman Aly
Publisher: Springer Nature
Published: 2023-09-25
Total Pages: 401
ISBN-13: 3031444698
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Author: Nadia El Mrabet
Publisher: Springer Nature
Published: 2023-07-12
Total Pages: 518
ISBN-13: 303137679X
DOWNLOAD EBOOKThis volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa. The 21 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Post-quantum cryptography; Symmetric cryptography; Cryptanalysis; Blockchain; Lattice-based cryptography; Implementations; Theory.
Author: Claude Carlet
Publisher: Springer Nature
Published:
Total Pages: 457
ISBN-13: 3031533682
DOWNLOAD EBOOKAuthor: Jian Guo
Publisher: Springer Nature
Published: 2024-01-18
Total Pages: 485
ISBN-13: 981998727X
DOWNLOAD EBOOKThe eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.