LEADER 03983nam 22008175 450 001 996508669503316 005 20230407163522.0 010 $a3-031-22966-5 024 7 $a10.1007/978-3-031-22966-4 035 $a(MiAaPQ)EBC7188093 035 $a(Au-PeEL)EBL7188093 035 $a(CKB)26073112400041 035 $a(DE-He213)978-3-031-22966-4 035 $a(PPN)267806914 035 $a(EXLCZ)9926073112400041 100 $a20230129d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2022$b[electronic resource] $e28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5?9, 2022, Proceedings, Part II /$fedited by Shweta Agrawal, Dongdai Lin 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (720 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13792 300 $aIncludes index. 311 08$aPrint version: Agrawal, Shweta Advances in Cryptology - ASIACRYPT 2022 Cham : Springer,c2023 9783031229657 327 $aIsogeny Based Cryptography -- Homomorphic Encryption -- NIZK and SNARKs -- Non Interactive Zero Knowledge -- and Symmetric Cryptography. . 330 $aThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13792 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aApplication software 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aData protection 606 $aCryptology 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aComputer and Information Systems Applications 606 $aUser Interfaces and Human Computer Interaction 606 $aSecurity Services 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApplication software. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aData protection. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aComputer and Information Systems Applications. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aSecurity Services. 676 $a016.391 702 $aAgrawal$b Shweta 702 $aLin$b Dongdai 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996508669503316 996 $aAdvances in Cryptology ? ASIACRYPT 2022$93091253 997 $aUNISA