
Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 15365)
Included in the following conference series:
Conference proceedings info: TCC 2024.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.
Similar content being viewed by others
Keywords
Table of contents (16 papers)
-
Quantum I
-
Math & Foundations
-
Proofs II
Other volumes
-
Theory of Cryptography
-
Theory of Cryptography
-
Theory of Cryptography
-
Theory of Cryptography
Editors and Affiliations
Bibliographic Information
Book Title: Theory of Cryptography
Book Subtitle: 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part II
Editors: Elette Boyle, Mohammad Mahmoody
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-78017-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2025
Softcover ISBN: 978-3-031-78016-5Published: 29 November 2024
eBook ISBN: 978-3-031-78017-2Published: 28 November 2024
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 497
Number of Illustrations: 11 b/w illustrations, 58 illustrations in colour
Topics: Cryptology, Security Services, Mobile and Network Security, Computer Communication Networks, Computer System Implementation, Data Structures and Information Theory