Description

Book Synopsis

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.

The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows:

Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes.

Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.



Table of Contents

Embedded security.- Privacy-preserving protocols.- Isogeny-based cryptography.- Encryption.- Advanced primitives.- Multiparty computation.- Blockchain.


Applied Cryptography and Network Security: 21st

Product form

£84.99

Includes FREE delivery

Order before 4pm today for delivery by Tue 20 Jan 2026.

A Paperback / softback by Mehdi Tibouchi, XiaoFeng Wang

Out of stock


    View other formats and editions of Applied Cryptography and Network Security: 21st by Mehdi Tibouchi

    Publisher: Springer International Publishing AG
    Publication Date: 28/05/2023
    ISBN13: 9783031334900, 978-3031334900
    ISBN10: 3031334906

    Description

    Book Synopsis

    The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.

    The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows:

    Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes.

    Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.



    Table of Contents

    Embedded security.- Privacy-preserving protocols.- Isogeny-based cryptography.- Encryption.- Advanced primitives.- Multiparty computation.- Blockchain.


    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account