- Table View
- List View
Advances in Cryptology – ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part VI (Lecture Notes in Computer Science #15489)
by Kai-Min Chung Yu SasakiThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Advances in Cryptology – ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part VII (Lecture Notes in Computer Science #15490)
by Kai-Min Chung Yu SasakiThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Advances in Cryptology – ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part IV (Lecture Notes in Computer Science #15487)
by Kai-Min Chung Yu SasakiThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Advances in Cryptology – ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part V (Lecture Notes in Computer Science #15488)
by Kai-Min Chung Yu SasakiThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Advances in Cryptology – ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings. Part VIII (Lecture Notes in Computer Science #15491)
by Kai-Min Chung Yu SasakiThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Advances in Cryptology – CRYPTO 2025: 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part III (Lecture Notes in Computer Science #16002)
by Yael Tauman Kalai Seny F. KamaraThe 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Advances in Cryptology – CRYPTO 2025: 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part IV (Lecture Notes in Computer Science #16003)
by Yael Tauman Kalai Seny F. KamaraThe 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Advances in Cryptology – CRYPTO 2025: 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part V (Lecture Notes in Computer Science #16004)
by Yael Tauman Kalai Seny F. KamaraThe 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Advances in Cryptology – CRYPTO 2025: 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VIII (Lecture Notes in Computer Science #16007)
by Yael Tauman Kalai Seny F. KamaraThe 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4–8, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15601)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15602)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15603)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part IV (Lecture Notes in Computer Science #15604)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part V (Lecture Notes in Computer Science #15605)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Lecture Notes in Computer Science #15606)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VII (Lecture Notes in Computer Science #15607)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VIII (Lecture Notes in Computer Science #15608)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cultural Tourism Research: Proceedings of the International Conference on Cultural Tourism Advances, June 2023, Belgium (Advances in Digital and Cultural Tourism Management)
by Marinos Ioannides João Martins Bart NeutsThis open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by examining successful policy interventions, emerging cultural tourism trends, advancements in visitor management systems, new business and governance models, and the opportunities arising from ICT in the twenty-first century. This book presents recent key advances and their significant outcomes in the domain of European Cultural Tourism.
Advances in Data Science and Artificial Intelligence: Proceedings of ERCICA 2024, Volume 1 (Lecture Notes in Electrical Engineering #1399)
by N. H. Prasad L. M. Patnaik G. T. RajuThis book contains the proceedings from the International Conference on Emerging Research in Computing, Information, Communication, and Applications (ERCICA) 2024. The conference offers an interdisciplinary platform for researchers, professional engineers, scientists, educators, and technologists to discuss, debate, and promote advancements in research and technology across various fields. Key topics covered include the Internet of Things (IoT), wireless communications, image and video processing, parallel and distributed computing, and smart grid applications, among others. This book explores these emerging research areas, providing a valuable resource for both researchers and practicing engineers.
Advances in Data Science and Optimization of Complex Systems: Proceedings of the International Conference on Applied Mathematics and Computer Science – ICAMCS 2024, Volume 1 (Lecture Notes in Networks and Systems #1311)
by Hoai An Le Thi Hoai Minh Le Quang Thuan NguyenThis proceeding set contains 81 selected full papers presented at the International Conference on Applied Mathematics and Computer Science (ICAMCS 2024), which was held on December 20-21, 2024 in Hanoi, Vietnam, in honor of Professors Pham Dinh Tao and Le Thi Hoai An for the 40th birthday of DC (Difference of Convex functions) programming and DCA (DC Algorithm). The book covers theoretical and algorithmic as well as practical issues connected with several domains of Applied Mathematics and Computer Science, especially Optimization and Data Science. The present part I of the 2-volume set includes articles devoted to Mathematical programming and optimization, DC Programming & DCA, Operations research and decision making, Economics & Finance, Engineering Systems, Autonomous systems, Information theory and Information security. Researchers and practitioners in related areas will find a wealth of inspiring ideas and useful tools and techniques for their own work.
Advances in Data and Information Sciences: Proceedings of ICDIS 2024, Volume 2 (Lecture Notes in Networks and Systems #1193)
by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar SinghThis book gathers a collection of high-quality peer-reviewed research papers presented at the 6th International Conference on Data and Information Sciences (ICDIS 2024), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 24–25, 2024. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it shows readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data-driven Computing and Intelligent Systems: Selected Papers from ADCIS 2024, Volume 1 (Lecture Notes in Networks and Systems #1304)
by Jagdish Chand Bansal Carlos A. Coello Coello Snehanshu Saha Hemant RathoreThis book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2024) held at BITS Pilani, K K Birla Goa Campus, Goa, India, during September 20–21, 2024. It includes state-of-the-art research work in the cutting-edge technologies in the field of data science and intelligent systems. The book presents data-driven computing; it is a new field of computational analysis which uses provided data to directly produce predictive outcomes. The book is useful for academicians, research scholars, and industry persons.
Advances in Deep Learning, Volume 2 (Studies in Big Data #12)
by M. Arif Wani Bisma Sultan Sarwat Ali Mukhtar Ahmad SofiThis book describes novel ways of using deep learning to solve real-world problems. It covers advanced deep learning topics like neural architecture search, ensemble deep learning, transfer learning techniques, lightweight architectures, hybrid deep learning approaches, and generative adversarial networks. The book discusses the use of these advanced topics in selected applications like image classification, object detection, image steganography, protein secondary structure prediction, and gene expression data classification. Various challenges and future research directions falling under the scope of these topics are discussed.
Advances in Dependable Systems and Networks: Proceedings of the Twentieth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 30 – July 3, 2025, Brunów, Poland (Lecture Notes in Networks and Systems #1427)
by Janusz Kacprzyk Wojciech Zamojski Jacek Mazurkiewicz Tomasz Walkowiak Jaroslaw SugierThis book presents the proceedings of the Twentieth International Conference on Dependability of Computer Systems, showcasing recent advancements in this broad area. Contemporary computer systems and networks are the most complex structures ever engineered by man yet their reliable operation is paramount in today&’s interconnected world. These systems form the backbone of almost every sector, from healthcare and finance to communication and transportation. Dependable systems ensure the seamless functioning of critical services, such as medical diagnostics, financial transactions, and emergency responses. This volume offers a selection of papers addressing challenges encountered in dependability studies of such systems. It can serve as an engaging and thought-provoking resource for scientists, researchers, engineers, and students who must tackle diverse dependability considerations in the design, analysis, or maintenance of contemporary computer systems. The 20th DepCoS-RELCOMEX conference marked yet another installment in a series of events held annually since 2006. Initially conceived as a platform for scholarly dialogue on reliability in computer engineering, the conference's focus has continually evolved to encompass emerging challenges arising from advancements in information technologies and computer engineering. Today, dependable computer operations involve delivering accurate and timely results while process
Advances in Design and Automation: Select Proceedings of ICFAMMT 2024 (Lecture Notes in Mechanical Engineering)
by Ajit Kumar Arun Kumar Ganesh Iyer Ulkesh DesaiThis book presents the select proceedings of International Conference on Futuristic Advancements in Materials, Manufacturing and Thermal Sciences (ICFAMMT 2024). It focuses on the recent advances in applied mechanics, approaches and application of technologies like Internet of Things (IoT), big data, cyber-physical systems (CPS), and smart factory to problems in design engineering. It highlights the applications of artificial intelligence and machine learning to the aspects of mechanical design. This book is useful for researchers and professionals in mechanical engineering and those working in IoT, big data, CPS, and Industry 4.0.