Applied cryptography and network security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings. Part II /

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and...

Full description

Corporate Authors: ACNS (Conference) Kyoto, Japan)
Other Authors: ACNS (Conference), Tibouchi, Mehdi, Wang, Xiaofeng, 1971-, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, 2023.
Physical Description: 1 online resource (xvii, 729 pages) : illustrations (some color).
Series: Lecture notes in computer science ; 13906.
Subjects:
Summary: The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Item Description: Embedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Includes author index.
Physical Description: 1 online resource (xvii, 729 pages) : illustrations (some color).
ISBN: 9783031334917
3031334914
ISSN: 1611-3349 ;