Go back

Advances In Cryptology ASIACRYPT 2021 27th International Conference On The Theory And Application Of Cryptology And Information Security Part IV LNCS 13093(1st Edition)

Authors:

Mehdi Tibouchi ,Huaxiong Wang

Free advances in cryptology asiacrypt 2021 27th international conference on the theory and application of
16 ratings
Cover Type:Hardcover
Condition:Used

In Stock

Include with your book

Free shipping: April 16, 2024
Access to 3 Million+ solutions Free
Ask 10 Questions from expert 200,000+ Expert answers
7 days-trial

Total Price:

$0

List Price: $119.99 Savings: $119.99(100%)

Book details

ISBN: 3030920674, 978-3030920678

Book publisher: Springer

Get your hands on the best-selling book Advances In Cryptology ASIACRYPT 2021 27th International Conference On The Theory And Application Of Cryptology And Information Security Part IV LNCS 13093 1st Edition for free. Feed your curiosity and let your imagination soar with the best stories coming out to you without hefty price tags. Browse SolutionInn to discover a treasure trove of fiction and non-fiction books where every page leads the reader to an undiscovered world. Start your literary adventure right away and also enjoy free shipping of these complimentary books to your door.

Advances In Cryptology ASIACRYPT 2021 27th International Conference On The Theory And Application Of Cryptology And Information Security Part IV LNCS 13093 1st Edition Summary: The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic.The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows:Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.