Advances in Cryptology - CRYPTO 2023 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV / [electronic resource] :
edited by Helena Handschuh, Anna Lysyanskaya.
- 1st ed. 2023.
- XIX, 766 p. 111 illus., 45 illus. in color. online resource.
- Lecture Notes in Computer Science, 14084 1611-3349 ; .
- Lecture Notes in Computer Science, 14084 .
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023. The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting. .
9783031385513
10.1007/978-3-031-38551-3 doi
Cryptography.
Data encryption (Computer science).
Computer engineering.
Computer networks .
Computer networks--Security measures.
Coding theory.
Information theory.
Cryptology.
Computer Engineering and Networks.
Mobile and Network Security.
Coding and Information Theory.
QA268
005.824
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023. The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting. .
9783031385513
10.1007/978-3-031-38551-3 doi
Cryptography.
Data encryption (Computer science).
Computer engineering.
Computer networks .
Computer networks--Security measures.
Coding theory.
Information theory.
Cryptology.
Computer Engineering and Networks.
Mobile and Network Security.
Coding and Information Theory.
QA268
005.824