000 | 02864nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-031-30872-7 | ||
003 | DE-He213 | ||
005 | 20240730164331.0 | ||
007 | cr nn 008mamaa | ||
008 | 230418s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031308727 _9978-3-031-30872-7 |
||
024 | 7 |
_a10.1007/978-3-031-30872-7 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTopics in Cryptology - CT-RSA 2023 _h[electronic resource] : _bCryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings / _cedited by Mike Rosulek. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXI, 702 p. 159 illus., 86 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13871 |
|
505 | 0 | _aCryptographic Implementations -- Quantum Cryptanalysis -- Advanced Public-Key Encryption -- Tools for Privacy-Enhancing Technologies -- Symmetric Cryptanalysis -- Multiparty Protocols -- Digital Signatures -- Fault Attacks and Side Channels -- Heuristic Approaches -- Symmetric-Key Constructions -- Key Agreement. | |
520 | _aThis book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023. The 26 full papers presented in this volume were carefully reviewed and selected from 76 submissions. The conference presents papers on subjects such as Cryptographic Implementations, Quantum Cryptanalysis, Advanced Public-Key Encryption, Tools for Privacy-Enhancing Technologies, Symmetric Cryptanalysis, Multiparty Protocols, Digital Signatures, Fault Attacks and Side Channels, Heuristic Approaches, Symmetric-Key Constructions, and Key Agreement. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aRosulek, Mike. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _983978 |
|
710 | 2 |
_aSpringerLink (Online service) _983980 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031308710 |
776 | 0 | 8 |
_iPrinted edition: _z9783031308734 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13871 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-30872-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c85595 _d85595 |