LEADER 03961nam 22008055 450 001 9910647383603321 005 20251225173547.0 010 $a3-031-22963-0 024 7 $a10.1007/978-3-031-22963-3 035 $a(MiAaPQ)EBC7186273 035 $a(Au-PeEL)EBL7186273 035 $a(CKB)26050267700041 035 $a(DE-He213)978-3-031-22963-3 035 $a(PPN)267806906 035 $a(EXLCZ)9926050267700041 100 $a20230124d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2022 $e28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5?9, 2022, Proceedings, Part I /$fedited by Shweta Agrawal, Dongdai Lin 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (846 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13791 311 08$aPrint version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229626 320 $aIncludes bibliographical references and index. 327 $aAward Papers -- Functional and Witness Encryption -- Symmetric Key Cryptanalysis -- Multiparty Computation -- Real World Protocols -- Blockchains and Cryptocurrencies. . 330 $aThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13791 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputers, Special purpose 606 $aComputer systems 606 $aCoding theory 606 $aInformation theory 606 $aApplication software 606 $aCryptology 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer System Implementation 606 $aCoding and Information Theory 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aComputer systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer System Implementation. 615 24$aCoding and Information Theory. 615 24$aComputer and Information Systems Applications. 676 $a005.8 676 $a005.8 702 $aLin$b Dongdai 702 $aAgrawal$b Shweta 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647383603321 996 $aAdvances in Cryptology ? ASIACRYPT 2022$93091253 997 $aUNINA