Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part I / [electronic resource] :
edited by Guy Rothblum, Hoeteck Wee.
- 1st ed. 2023.
- XII, 504 p. 54 illus., 9 illus. in color. online resource.
- Lecture Notes in Computer Science, 14369 1611-3349 ; .
- Lecture Notes in Computer Science, 14369 .
Proofs and outsourcing -- theoretical foundations -- multi-party computation.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. .
9783031486159
10.1007/978-3-031-48615-9 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Computer systems.
Data structures (Computer science).
Information theory.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
Data Structures and Information Theory.
QA268
005.824
Proofs and outsourcing -- theoretical foundations -- multi-party computation.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. .
9783031486159
10.1007/978-3-031-48615-9 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks--Security measures.
Computer networks .
Computer systems.
Data structures (Computer science).
Information theory.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
Data Structures and Information Theory.
QA268
005.824