Cryptography and Coding 19th IMA International Conference, IMACC 2023, London, UK, December 12–14, 2023, Proceedings /
Cryptography and Coding 19th IMA International Conference, IMACC 2023, London, UK, December 12–14, 2023, Proceedings / [electronic resource] :
edited by Elizabeth A. Quaglia.
- 1st ed. 2024.
- X, 1 p. 51 illus., 2 illus. in color. online resource.
- Lecture Notes in Computer Science, 14421 1611-3349 ; .
- Lecture Notes in Computer Science, 14421 .
Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12–14, 2023 The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.
9783031478185
10.1007/978-3-031-47818-5 doi
Cryptography.
Data encryption (Computer science).
Data structures (Computer science).
Information theory.
Computer networks--Security measures.
Application software.
Cryptology.
Data Structures and Information Theory.
Mobile and Network Security.
Computer and Information Systems Applications.
QA268
005.824
Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12–14, 2023 The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.
9783031478185
10.1007/978-3-031-47818-5 doi
Cryptography.
Data encryption (Computer science).
Data structures (Computer science).
Information theory.
Computer networks--Security measures.
Application software.
Cryptology.
Data Structures and Information Theory.
Mobile and Network Security.
Computer and Information Systems Applications.
QA268
005.824