Get Free Shipping on orders over $79
Advances in Cryptology - ASIACRYPT 2023 : 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III - Jian Guo

Advances in Cryptology - ASIACRYPT 2023

29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III

By: Jian Guo (Editor), Ron Steinfeld (Editor)

eText | 17 December 2023

At a Glance

eText


$129.00

or 4 interest-free payments of $32.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.

The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:

Part I: Secure Multi-party computation; threshold cryptography; .

Part II: proof systems - succinctness and foundations; anonymity;

Part III: quantum cryptanalysis; symmetric-key cryptanalysis;

Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;

Part V: functional encryption, commitments and proofs; secure messaging and broadcast;

Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models;

Part VII: post-quantum cryptography;

Part VIII: quantum cryptography; key exchange; symmetric-key design.

on
Desktop
Tablet
Mobile

More in Business Applications

C-Scape : Conquer the Forces Changing Business Today - Larry Kramer

eBOOK

The End of Leadership - Barbara Kellerman

eBOOK

Theoretical Ecology : Concepts and Models with R - Ryan Chisholm

eBOOK