001463268 000__ 03360cam\a22006257i\4500 001463268 001__ 1463268 001463268 003__ OCoLC 001463268 005__ 20230601003313.0 001463268 006__ m\\\\\o\\d\\\\\\\\ 001463268 007__ cr\cn\nnnunnun 001463268 008__ 230418s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001463268 020__ $$a9783031306174$$qelectronic book 001463268 020__ $$a3031306171$$qelectronic book 001463268 020__ $$z9783031306167 001463268 0247_ $$a10.1007/978-3-031-30617-4$$2doi 001463268 035__ $$aSP(OCoLC)1376355561 001463268 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKAHL$$dYDX 001463268 049__ $$aISEA 001463268 050_4 $$aQA76.9.A25$$b.E97 2023 001463268 08204 $$a005.82$$223/eng/20230418 001463268 1112_ $$aEUROCRYPT (Conference)$$n(42nd :$$d2023 :$$cLyon, France) 001463268 24510 $$aAdvances in cryptology -- EUROCRYPT 2023 :$$b42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings.$$nPart II /$$cCarmit Hazay, Martijn Stam, editors. 001463268 2463_ $$aEUROCRYPT 001463268 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001463268 300__ $$a1 online resource (xvi, 628 pages) :$$billustrations (some color). 001463268 336__ $$atext$$btxt$$2rdacontent 001463268 337__ $$acomputer$$bc$$2rdamedia 001463268 338__ $$aonline resource$$bcr$$2rdacarrier 001463268 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14005 001463268 500__ $$aIncludes author index. 001463268 506__ $$aAccess limited to authorized users. 001463268 520__ $$aThis five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023. The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge. 001463268 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 18, 2023). 001463268 650_0 $$aComputers$$xAccess control$$vCongresses. 001463268 650_0 $$aData encryption (Computer science)$$vCongresses. 001463268 650_0 $$aComputer security$$vCongresses. 001463268 650_0 $$aCryptography$$vCongresses. 001463268 655_0 $$aElectronic books. 001463268 7001_ $$aHazay, Carmit,$$eeditor.$$1https://orcid.org/0000-0002-8951-5099 001463268 7001_ $$aStam, Martijn,$$eeditor.$$1https://orcid.org/0000-0002-5319-4625 001463268 830_0 $$aLecture notes in computer science ;$$v14005.$$x1611-3349 001463268 852__ $$bebk 001463268 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-30617-4$$zOnline Access$$91397441.1 001463268 909CO $$ooai:library.usi.edu:1463268$$pGLOBAL_SET 001463268 980__ $$aBIB 001463268 980__ $$aEBOOK 001463268 982__ $$aEbook 001463268 983__ $$aOnline 001463268 994__ $$a92$$bISE