LEADER 03803nam 22008055 450 001 9910647396603321 005 20251225173510.0 010 $a3-031-22972-X 024 7 $a10.1007/978-3-031-22972-5 035 $a(MiAaPQ)EBC7186272 035 $a(Au-PeEL)EBL7186272 035 $a(CKB)26050267100041 035 $a(DE-He213)978-3-031-22972-5 035 $a(PPN)267806922 035 $a(EXLCZ)9926050267100041 100 $a20230124d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2022 $e28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5?9, 2022, Proceedings, Part IV /$fedited by Shweta Agrawal, Dongdai Lin 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (667 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13794 311 08$aPrint version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229718 320 $aIncludes bibliographical references and index. 327 $aSignatures -- Commitments -- Theory -- Cryptoanalysis -- Quantum Cryptography. 330 $aThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13794 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aComputer engineering 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptology 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aComputer Engineering and Networks 606 $aSecurity Services 606 $aMobile and Network Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer engineering. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aComputer Engineering and Networks. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 676 $a005.8 676 $a005.8 702 $aLin$b Dongdai 702 $aAgrawal$b Shweta 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647396603321 996 $aAdvances in Cryptology ? ASIACRYPT 2022$93091253 997 $aUNINA