04295nam 22007695 450 99641821390331620200704182654.03-030-45374-X10.1007/978-3-030-45374-9(CKB)4100000011223245(MiAaPQ)EBC6287220(DE-He213)978-3-030-45374-9(PPN)243761082(EXLCZ)99410000001122324520200411d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPublic-Key Cryptography – PKC 2020[electronic resource] 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I /edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (692 pages)Security and Cryptology ;121103-030-45373-1 Functional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes.The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.Security and Cryptology ;12110Data encryption (Computer science)Computer securityComputer networksSecurity measuresComputer communication systemsCoding theoryInformation theoryComputersCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Security Serviceshttps://scigraph.springernature.com/ontologies/product-market-codes/I28030Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Computing Milieuxhttps://scigraph.springernature.com/ontologies/product-market-codes/I24008Data encryption (Computer science).Computer security.Computer networksSecurity measures.Computer communication systems.Coding theory.Information theory.Computers.Cryptology.Security Services.Mobile and Network Security.Computer Communication Networks.Coding and Information Theory.Computing Milieux.005.8Kiayias Aggelosedthttp://id.loc.gov/vocabulary/relators/edtKohlweiss Markulfedthttp://id.loc.gov/vocabulary/relators/edtWallden Petrosedthttp://id.loc.gov/vocabulary/relators/edtZikas Vassilisedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418213903316Public-Key Cryptography – PKC 20202007081UNISA