Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13178)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: PKC 2022.
Buy print copy
About this book
The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
Similar content being viewed by others
Keywords
- access control
- advanced cryptography
- authentication
- computer networks
- computer security
- cryptanalysis
- cryptographic protocol
- cryptography
- data privacy
- data security
- electronic document identification systems
- encryption
- key exchange
- multi-party computation
- network protocols
- network security
- public key cryptography
- public key encryption
- secret sharing
- zero-knowledge proof
Table of contents (17 papers)
-
Key Exchange
-
Encryption
Other volumes
-
Public-Key Cryptography – PKC 2022
-
Public-Key Cryptography – PKC 2022
Editors and Affiliations
Bibliographic Information
Book Title: Public-Key Cryptography – PKC 2022
Book Subtitle: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II
Editors: Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-97131-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2022
Softcover ISBN: 978-3-030-97130-4Published: 27 February 2022
eBook ISBN: 978-3-030-97131-1Published: 26 February 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 530
Number of Illustrations: 59 b/w illustrations, 9 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Coding and Information Theory, Mobile and Network Security, Information Systems Applications (incl. Internet)