000 | 03099nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-15802-5 | ||
003 | DE-He213 | ||
005 | 20240730170006.0 | ||
007 | cr nn 008mamaa | ||
008 | 221011s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031158025 _9978-3-031-15802-5 |
||
024 | 7 |
_a10.1007/978-3-031-15802-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - CRYPTO 2022 _h[electronic resource] : _b42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I / _cedited by Yevgeniy Dodis, Thomas Shrimpton. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2022. |
|
300 |
_aXIX, 815 p. 114 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13507 |
|
505 | 0 | _aCryptanalysis I -- Randomness -- Quantum Cryptography I -- Secure Multiparty Computation I -- Proof Systems -- Advanced Encryption Systems -- Secure Multiparty Computation II -- Secure Messaging. | |
520 | _aThe 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. . | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aDodis, Yevgeniy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991540 |
|
700 | 1 |
_aShrimpton, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991541 |
|
710 | 2 |
_aSpringerLink (Online service) _991542 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031158018 |
776 | 0 | 8 |
_iPrinted edition: _z9783031158032 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13507 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-15802-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86667 _d86667 |