Advances in Cryptology - EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II / [electronic resource] :
edited by Marc Joye, Gregor Leander.
- 1st ed. 2024.
- XVIII, 466 p. 58 illus., 12 illus. in color. online resource.
- Lecture Notes in Computer Science, 14652 1611-3349 ; .
- Lecture Notes in Computer Science, 14652 .
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
9783031587238
10.1007/978-3-031-58723-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Information technology--Management.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer Application in Administrative Data Processing.
QA268
005.824
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
9783031587238
10.1007/978-3-031-58723-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Information technology--Management.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer Application in Administrative Data Processing.
QA268
005.824