![9783031577277-3031577272-Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_41yo6PCmpHL._SL500_.jpg)
Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604)
ISBN-13:
9783031577277
ISBN-10:
3031577272
Edition:
2024
Author:
Vanessa Teague, Qiang Tang
Publication date:
2024
Publisher:
Springer
Format:
Paperback
429 pages
FREE US shipping
Book details
ISBN-13:
9783031577277
ISBN-10:
3031577272
Edition:
2024
Author:
Vanessa Teague, Qiang Tang
Publication date:
2024
Publisher:
Springer
Format:
Paperback
429 pages
Summary
Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604) (ISBN-13: 9783031577277 and ISBN-10: 3031577272), written by authors
Vanessa Teague, Qiang Tang, was published by Springer in 2024.
With an overall rating of 3.7 stars, it's a notable title among other
books. You can easily purchase or rent Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, ... IV (Lecture Notes in Computer Science, 14604) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024.
The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}