|
|
|
|
LEADER |
02776nmm a2200433 u 4500 |
001 |
EB002141360 |
003 |
EBX01000000000000001279486 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230201 ||| eng |
020 |
|
|
|a 9783031229633
|
100 |
1 |
|
|a Agrawal, Shweta
|e [editor]
|
245 |
0 |
0 |
|a Advances in Cryptology – ASIACRYPT 2022
|h Elektronische Ressource
|b 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I
|c edited by Shweta Agrawal, Dongdai Lin
|
250 |
|
|
|a 1st ed. 2022
|
260 |
|
|
|a Cham
|b Springer Nature Switzerland
|c 2022, 2022
|
300 |
|
|
|a XV, 838 p. 134 illus., 50 illus. in color
|b online resource
|
505 |
0 |
|
|a Award Papers -- Functional and Witness Encryption -- Symmetric Key Cryptanalysis -- Multiparty Computation -- Real World Protocols -- Blockchains and Cryptocurrencies.
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Computer systems
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer System Implementation
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Special Purpose and Application-Based Systems
|
653 |
|
|
|a Computers, Special purpose
|
700 |
1 |
|
|a Lin, Dongdai
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-3-031-22963-3
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-22963-3?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography
|