03770nam 22008055 450 991064739820332120251225173621.03-031-22969-X10.1007/978-3-031-22969-5(MiAaPQ)EBC7186233(Au-PeEL)EBL7186233(CKB)26050275200041(DE-He213)978-3-031-22969-5(PPN)267806957(EXLCZ)992605027520004120230124d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2022 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III /edited by Shweta Agrawal, Dongdai Lin1st ed. 2022.Cham :Springer Nature Switzerland :Imprint: Springer,2022.1 online resource (812 pages)Lecture Notes in Computer Science,1611-3349 ;13793Print version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229688 Includes bibliographical references and index.Practical Cryptography -- Advanced Encryption -- Zero Knowledge -- Quantum Algorithms -- Lattice Cryptoanalysis.The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.Lecture Notes in Computer Science,1611-3349 ;13793CryptographyData encryption (Computer science)Numerical analysisComputer networksComputer systemsCoding theoryInformation theoryData protectionCryptologyNumerical AnalysisComputer Communication NetworksComputer System ImplementationCoding and Information TheorySecurity ServicesCryptography.Data encryption (Computer science)Numerical analysis.Computer networks.Computer systems.Coding theory.Information theory.Data protection.Cryptology.Numerical Analysis.Computer Communication Networks.Computer System Implementation.Coding and Information Theory.Security Services.005.8005.8Lin DongdaiAgrawal ShwetaMiAaPQMiAaPQMiAaPQBOOK9910647398203321Advances in Cryptology – ASIACRYPT 20223091253UNINA