Advances in Cryptology – ASIACRYPT 2024
30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part V
Series: Lecture Notes in Computer Science; 15488;
- Publisher's listprice EUR 79.17
-
32 835 Ft (31 272 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 6 567 Ft off)
- Discounted price 26 268 Ft (25 018 Ft + 5% VAT)
- Discount is valid until: 31 December 2025
Subcribe now and take benefit of a favourable price.
Subscribe
32 835 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Springer Nature Singapore
- Date of Publication 10 December 2024
- Number of Volumes 1 pieces, Book
- ISBN 9789819609345
- Binding Paperback
- No. of pages471 pages
- Size 235x155 mm
- Language English
- Illustrations XVIII, 471 p. 74 illus., 14 illus. in color. Illustrations, black & white 602
Categories
Long description:
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024.
The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
MoreTable of Contents:
Key Exchange Protocols.- Succinct Arguments.- Verifiable Computation.- Zero-knowledge Protocols.
More