001463265 000__ 03372cam\a22006257i\4500 001463265 001__ 1463265 001463265 003__ OCoLC 001463265 005__ 20230601003312.0 001463265 006__ m\\\\\o\\d\\\\\\\\ 001463265 007__ cr\cn\nnnunnun 001463265 008__ 230418s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001463265 020__ $$a9783031305450$$qelectronic book 001463265 020__ $$a3031305450$$qelectronic book 001463265 020__ $$z9783031305443$$qprint 001463265 0247_ $$a10.1007/978-3-031-30545-0$$2doi 001463265 035__ $$aSP(OCoLC)1376355130 001463265 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKAHL$$dYDX 001463265 049__ $$aISEA 001463265 050_4 $$aQA76.9.A25$$b.E97 2023 001463265 08204 $$a005.82$$223/eng/20230418 001463265 1112_ $$aEUROCRYPT (Conference)$$n(42nd :$$d2023 :$$cLyon, France) 001463265 24510 $$aAdvances in cryptology -- EUROCRYPT 2023 :$$b42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings.$$nPart I /$$cCarmit Hazay, Martijn Stam, editors. 001463265 2463_ $$aEUROCRYPT 2023 001463265 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001463265 300__ $$a1 online resource (xvii, 670 pages) :$$billustrations (some color). 001463265 336__ $$atext$$btxt$$2rdacontent 001463265 337__ $$acomputer$$bc$$2rdamedia 001463265 338__ $$aonline resource$$bcr$$2rdacarrier 001463265 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14004 001463265 500__ $$aIncludes author index. 001463265 506__ $$aAccess limited to authorized users. 001463265 520__ $$aThis five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023. The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge. 001463265 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 18, 2023). 001463265 650_0 $$aComputers$$xAccess control$$vCongresses. 001463265 650_0 $$aData encryption (Computer science)$$vCongresses. 001463265 650_0 $$aComputer security$$vCongresses. 001463265 650_0 $$aCryptography$$vCongresses. 001463265 655_0 $$aElectronic books. 001463265 7001_ $$aHazay, Carmit,$$eeditor.$$1https://orcid.org/0000-0002-8951-5099 001463265 7001_ $$aStam, Martijn,$$eeditor.$$1https://orcid.org/0000-0002-5319-4625 001463265 830_0 $$aLecture notes in computer science ;$$v14004.$$x1611-3349 001463265 852__ $$bebk 001463265 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-30545-0$$zOnline Access$$91397441.1 001463265 909CO $$ooai:library.usi.edu:1463265$$pGLOBAL_SET 001463265 980__ $$aBIB 001463265 980__ $$aEBOOK 001463265 982__ $$aEbook 001463265 983__ $$aOnline 001463265 994__ $$a92$$bISE