03803nam 22008055 450 991064739660332120251225173510.03-031-22972-X10.1007/978-3-031-22972-5(MiAaPQ)EBC7186272(Au-PeEL)EBL7186272(CKB)26050267100041(DE-He213)978-3-031-22972-5(PPN)267806922(EXLCZ)992605026710004120230124d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2022 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part IV /edited by Shweta Agrawal, Dongdai Lin1st ed. 2022.Cham :Springer Nature Switzerland :Imprint: Springer,2022.1 online resource (667 pages)Lecture Notes in Computer Science,1611-3349 ;13794Print version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229718 Includes bibliographical references and index.Signatures -- Commitments -- Theory -- Cryptoanalysis -- Quantum Cryptography.The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.Lecture Notes in Computer Science,1611-3349 ;13794CryptographyData encryption (Computer science)Computer networksCoding theoryInformation theoryComputer engineeringData protectionComputer networksSecurity measuresCryptologyComputer Communication NetworksCoding and Information TheoryComputer Engineering and NetworksSecurity ServicesMobile and Network SecurityCryptography.Data encryption (Computer science)Computer networks.Coding theory.Information theory.Computer engineering.Data protection.Computer networksSecurity measures.Cryptology.Computer Communication Networks.Coding and Information Theory.Computer Engineering and Networks.Security Services.Mobile and Network Security.005.8005.8Lin DongdaiAgrawal ShwetaMiAaPQMiAaPQMiAaPQBOOK9910647396603321Advances in Cryptology – ASIACRYPT 20223091253UNINA