Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13178)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: PKC 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
Similar content being viewed by others
Keywords
- access control
- advanced cryptography
- authentication
- computer networks
- computer security
- cryptanalysis
- cryptographic protocol
- cryptography
- data privacy
- data security
- electronic document identification systems
- encryption
- key exchange
- multi-party computation
- network protocols
- network security
- public key cryptography
- public key encryption
- secret sharing
- zero-knowledge proof
Table of contents (17 papers)
Other volumes
-
Public-Key Cryptography – PKC 2022
-
Public-Key Cryptography – PKC 2022
Editors and Affiliations
Bibliographic Information
Book Title: Public-Key Cryptography – PKC 2022
Book Subtitle: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II
Editors: Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-97131-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2022
Softcover ISBN: 978-3-030-97130-4Published: 27 February 2022
eBook ISBN: 978-3-030-97131-1Published: 26 February 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 530
Number of Illustrations: 59 b/w illustrations, 9 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Coding and Information Theory, Mobile and Network Security, Information Systems Applications (incl. Internet)