
Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 15490)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2024.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024.
The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Similar content being viewed by others
Keywords
- cryptography
- computer security
- data privacy
- data security
- encryption
- network protocols
- public key cryptography
- authentication
- zero-knowledge
- multi-party computation
- symmetric key
- cryptanalysis
- side-channels
- post-quantum cryptography
- quantum
- anonymity
- proof systems
- computational complexity
- cryptographic protocols
- cryptographic implementations
Table of contents (15 papers)
-
Information-Theoretic Cryptography
-
Security Against Physical Attacks
-
Cryptanalysis on Symmetric-Key Schemes
Other volumes
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
-
Advances in Cryptology – ASIACRYPT 2024
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2024
Book Subtitle: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part VII
Editors: Kai-Min Chung, Yu Sasaki
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-981-96-0941-3
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2025
Softcover ISBN: 978-981-96-0940-6Published: 12 December 2024
eBook ISBN: 978-981-96-0941-3Published: 08 December 2024
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 492
Number of Illustrations: 35 b/w illustrations, 43 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Computer Applications, Security Services, Mobile and Network Security