Books+ Search Results

Advances in Cryptology - CRYPTO 2024 44th Annual International Cryptology Conference, CRYPTO 2024, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VIII

Title
Advances in Cryptology - CRYPTO 2024 [electronic resource] : 44th Annual International Cryptology Conference, CRYPTO 2024, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VIII / edited by Leonid Reyzin, Douglas Stebila.
ISBN
9783031683978
Edition
1st ed. 2024.
Publication
Cham : Springer Nature Switzerland : Imprint: Springer, 2024.
Physical Description
1 online resource (XXII, 489 p.) 63 illus., 19 illus. in color.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments. .
Variant and related titles
Springer ENIN.
Other formats
Printed edition:
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
August 21, 2024
Series
Lecture Notes in Computer Science, 14927
Lecture Notes in Computer Science, 14927
Contents
Digital signatures
Cloud cryptography
Consensus protocols
Key exchange
Public key encryption
Public-key cryptography with advanced functionalities
Time-lock cryptography
Symmetric cryptanalysis
Symmetric cryptograph
Mathematical assumptions
Secret sharing
Theoretical foundations
Cryptanalysis
New primitives
Side-channels and leakage
Quantum cryptography
Threshold cryptography
Multiparty computation
Private information retrieval
Zero-knowledge
Succinct arguments.
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?