Get Free Shipping on orders over $79
Advances in Cryptology - ASIACRYPT 2024 : 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I - Kai-Min Chung

Advances in Cryptology - ASIACRYPT 2024

30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I

By: Kai-Min Chung (Editor), Yu Sasaki (Editor)

eText | 9 December 2024

At a Glance

eText


$119.00

or 4 interest-free payments of $29.75 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.

The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verfiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

on
Desktop
Tablet
Mobile

More in Business Applications

C-Scape : Conquer the Forces Changing Business Today - Larry Kramer

eBOOK

The End of Leadership - Barbara Kellerman

eBOOK

Theoretical Ecology : Concepts and Models with R - Ryan Chisholm

eBOOK

Strategies for Peace and Prosperity - Shui Yin Lo

eBOOK