9783031577277-3031577272-Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604)

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604)

ISBN-13: 9783031577277
ISBN-10: 3031577272
Edition: 2024
Author: Vanessa Teague, Qiang Tang
Publication date: 2024
Publisher: Springer
Format: Paperback 429 pages
FREE US shipping

Book details

ISBN-13: 9783031577277
ISBN-10: 3031577272
Edition: 2024
Author: Vanessa Teague, Qiang Tang
Publication date: 2024
Publisher: Springer
Format: Paperback 429 pages

Summary

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604) (ISBN-13: 9783031577277 and ISBN-10: 3031577272), written by authors Vanessa Teague, Qiang Tang, was published by Springer in 2024. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024.

The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book