CHF 133.00

Advances in Cryptology - ASIACRYPT 2025
31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8-12, 2025, Proceedings, Part III

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8 12, 2025.
The 143 full papers included in the proceedings were carefully reviewed and selected from 533 submissions. These papers were organized into the following topical sections: Symmetric Cryptography; Cryptanalysis; Mathematic Aspects of Symmetric Cryptography; Secure Messaging; Formalization and Key Exchange; Data Structures; Blockchain; Secure Implementations; Design and Analysis of Implementations; Lattices; Post-Quantum Signatures; Groups and Group Actions; Isogenies; Multivariate Cryptanalysis and Code-based Crypto; Secure Computation; Succinct Proofs; Encryption with Advanced Features; Signatures with Advanced Features; Threshold Cryptography; Fully Homomorphic Encryption; Verifiable Computation; Pseudorandom Correlation; Secret Sharing; Quantum; and Foundations.

Dettagli sul prodotto

Con la collaborazione di Goichiro Hanaoka (Editore), Bo-Yin Yang (Editore), Yang (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Contenuto Libro
Forma del prodotto Tascabile
Data pubblicazione 03.01.2026
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica
 
EAN 9789819550982
ISBN 978-981-9550-98-2
Numero di pagine 528
Illustrazioni XXII, 528 p. 52 illus., 31 illus. in color.
Dimensioni (della confezione) 15.5 x 2.9 x 23.5 cm
Peso (della confezione) 826 g
 
Serie Lecture Notes in Computer Science > 16247
Categorie Computersicherheit, Netzwerksicherheit, angewandte informatik, Netzwerk-Hardware, Kryptografie, Verschlüsselungstechnologie, Data Privacy, Quantum, authentication, cryptography, Computer and Information Systems Applications, data security, Computer Communication Networks, Computer security, Cryptology, Computational complexity, Mobile and Network Security, Security Services, Encryption, network protocols, cryptographic protocols, Public Key Cryptography, Anonymity, cryptographic implementations, post-quantum cryptography, cryptanalysis, Proof systems, Multi-party Computation, Zero-knowledge, side-channels, symmetric key
 

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.