Advances in Cryptology - EUROCRYPT 2022 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III / [electronic resource] :
edited by Orr Dunkelman, Stefan Dziembowski.
- 1st ed. 2022.
- XVII, 831 p. 64 illus., 2 illus. in color. online resource.
- Lecture Notes in Computer Science, 13277 1611-3349 ; .
- Lecture Notes in Computer Science, 13277 .
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
9783031070822
10.1007/978-3-031-07082-2 doi
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Data protection.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Security Services.
Data and Information Security.
QA268
005.824
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
9783031070822
10.1007/978-3-031-07082-2 doi
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Data protection.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Security Services.
Data and Information Security.
QA268
005.824