Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Advances in cryptology - ASIACRYPT 2022 : 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5-9, 2022, proceedings, part IV / edited by Shweta Agrawal and Dongdai Lin.
Format
Book
Language
English
Εdition
1st ed. 2022.
Published/Created
Cham, Switzerland : Springer, [2023]
©2023
Description
1 online resource (667 pages)
Availability
Available Online
Springer Nature - Springer Lecture Notes in Computer Science eBooks
Springer Nature - Springer Computer Science eBooks 2022 English International
Details
Subject(s)
Computer security
—
Congresses
[Browse]
Data encryption (Computer science)
[Browse]
Computer security
[Browse]
Editor
Lin, Dongdai
[Browse]
Agrawal, Shweta
[Browse]
Series
Lecture Notes in Computer Science, 13794
[More in this series]
Lecture Notes in Computer Science, 1611-3349 ; 13794
[More in this series]
Summary note
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Bibliographic references
Includes bibliographical references and index.
Source of description
Description based on print version record.
Contents
Signatures
Commitments
Theory
Cryptoanalysis
Quantum Cryptography.
Show 2 more Contents items
ISBN
3-031-22972-X
Doi
10.1007/978-3-031-22972-5
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information