001463269 000__ 03365cam\a22006257i\4500 001463269 001__ 1463269 001463269 003__ OCoLC 001463269 005__ 20230601003313.0 001463269 006__ m\\\\\o\\d\\\\\\\\ 001463269 007__ cr\cn\nnnunnun 001463269 008__ 230418s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001463269 020__ $$a9783031305894$$qelectronic book 001463269 020__ $$a3031305892$$qelectronic book 001463269 020__ $$z9783031305887 001463269 0247_ $$a10.1007/978-3-031-30589-4$$2doi 001463269 035__ $$aSP(OCoLC)1376355709 001463269 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKAHL$$dYDX 001463269 049__ $$aISEA 001463269 050_4 $$aQA76.9.A25$$b.E97 2023 001463269 08204 $$a005.82$$223/eng/20230418 001463269 1112_ $$aEUROCRYPT (Conference)$$n(42nd :$$d2023 :$$cLyon, France) 001463269 24510 $$aAdvances in cryptology -- EUROCRYPT 2023 :$$b42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings.$$nPart V /$$cCarmit Hazay, Martijn Stam, editors. 001463269 2463_ $$aEUROCRYPT 2023 001463269 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001463269 300__ $$a1 online resource (xvii, 786 pages) :$$billustrations (some color). 001463269 336__ $$atext$$btxt$$2rdacontent 001463269 337__ $$acomputer$$bc$$2rdamedia 001463269 338__ $$aonline resource$$bcr$$2rdacarrier 001463269 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14008 001463269 500__ $$aIncludes author index. 001463269 506__ $$aAccess limited to authorized users. 001463269 520__ $$aThis five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023. The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge. 001463269 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 18, 2023). 001463269 650_0 $$aComputers$$xAccess control$$vCongresses. 001463269 650_0 $$aData encryption (Computer science)$$vCongresses. 001463269 650_0 $$aComputer security$$vCongresses. 001463269 650_0 $$aCryptography$$vCongresses. 001463269 655_0 $$aElectronic books. 001463269 7001_ $$aHazay, Carmit,$$eeditor.$$1https://orcid.org/0000-0002-8951-5099 001463269 7001_ $$aStam, Martijn,$$eeditor.$$1https://orcid.org/0000-0002-5319-4625 001463269 830_0 $$aLecture notes in computer science ;$$v14008.$$x1611-3349 001463269 852__ $$bebk 001463269 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-30589-4$$zOnline Access$$91397441.1 001463269 909CO $$ooai:library.usi.edu:1463269$$pGLOBAL_SET 001463269 980__ $$aBIB 001463269 980__ $$aEBOOK 001463269 982__ $$aEbook 001463269 983__ $$aOnline 001463269 994__ $$a92$$bISE