001468314 000__ 03452cam\\22006137i\4500 001468314 001__ 1468314 001468314 003__ OCoLC 001468314 005__ 20230707003246.0 001468314 006__ m\\\\\o\\d\\\\\\\\ 001468314 007__ cr\un\nnnunnun 001468314 008__ 230530s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001468314 020__ $$a9783031334917$$q(electronic bk.) 001468314 020__ $$a3031334914$$q(electronic bk.) 001468314 020__ $$z9783031334900 001468314 0247_ $$a10.1007/978-3-031-33491-7$$2doi 001468314 035__ $$aSP(OCoLC)1380721834 001468314 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP 001468314 049__ $$aISEA 001468314 050_4 $$aQA76.9.A25 001468314 08204 $$a005.8/2$$223/eng/20230530 001468314 1112_ $$aACNS (Conference)$$n(21st :$$d2023 :$$cKyoto, Japan) 001468314 24510 $$aApplied cryptography and network security :$$b21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings.$$nPart II /$$cMehdi Tibouchi, XiaoFeng Wang, editors. 001468314 2463_ $$aACNS 2023 001468314 264_1 $$aCham :$$bSpringer,$$c2023. 001468314 300__ $$a1 online resource (xvii, 729 pages) :$$billustrations (some color). 001468314 336__ $$atext$$btxt$$2rdacontent 001468314 337__ $$acomputer$$bc$$2rdamedia 001468314 338__ $$aonline resource$$bcr$$2rdacarrier 001468314 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13906 001468314 500__ $$aIncludes author index. 001468314 5050_ $$aEmbedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain. 001468314 506__ $$aAccess limited to authorized users. 001468314 520__ $$aThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. 001468314 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 30, 2023). 001468314 650_0 $$aData encryption (Computer science)$$vCongresses. 001468314 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001468314 655_0 $$aElectronic books. 001468314 7001_ $$aTibouchi, Mehdi,$$eeditor.$$1https://orcid.org/0000-0002-2736-2963 001468314 7001_ $$aWang, Xiaofeng,$$d1971-$$eeditor.$$1https://orcid.org/0000-0002-0607-4946 001468314 830_0 $$aLecture notes in computer science ;$$v13906.$$x1611-3349 001468314 852__ $$bebk 001468314 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-33491-7$$zOnline Access$$91397441.1 001468314 909CO $$ooai:library.usi.edu:1468314$$pGLOBAL_SET 001468314 980__ $$aBIB 001468314 980__ $$aEBOOK 001468314 982__ $$aEbook 001468314 983__ $$aOnline 001468314 994__ $$a92$$bISE