LEADER 03770nam 22008055 450 001 9910647398203321 005 20251225173621.0 010 $a3-031-22969-X 024 7 $a10.1007/978-3-031-22969-5 035 $a(MiAaPQ)EBC7186233 035 $a(Au-PeEL)EBL7186233 035 $a(CKB)26050275200041 035 $a(DE-He213)978-3-031-22969-5 035 $a(PPN)267806957 035 $a(EXLCZ)9926050275200041 100 $a20230124d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2022 $e28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5?9, 2022, Proceedings, Part III /$fedited by Shweta Agrawal, Dongdai Lin 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (812 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13793 311 08$aPrint version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229688 320 $aIncludes bibliographical references and index. 327 $aPractical Cryptography -- Advanced Encryption -- Zero Knowledge -- Quantum Algorithms -- Lattice Cryptoanalysis. 330 $aThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13793 606 $aCryptography 606 $aData encryption (Computer science) 606 $aNumerical analysis 606 $aComputer networks 606 $aComputer systems 606 $aCoding theory 606 $aInformation theory 606 $aData protection 606 $aCryptology 606 $aNumerical Analysis 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aCoding and Information Theory 606 $aSecurity Services 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aNumerical analysis. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData protection. 615 14$aCryptology. 615 24$aNumerical Analysis. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aCoding and Information Theory. 615 24$aSecurity Services. 676 $a005.8 676 $a005.8 702 $aLin$b Dongdai 702 $aAgrawal$b Shweta 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647398203321 996 $aAdvances in Cryptology ? ASIACRYPT 2022$93091253 997 $aUNINA