000 | 03080nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-15982-4 | ||
003 | DE-He213 | ||
005 | 20240730170142.0 | ||
007 | cr nn 008mamaa | ||
008 | 221011s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031159824 _9978-3-031-15982-4 |
||
024 | 7 |
_a10.1007/978-3-031-15982-4 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - CRYPTO 2022 _h[electronic resource] : _b42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III / _cedited by Yevgeniy Dodis, Thomas Shrimpton. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2022. |
|
300 |
_aXIX, 809 p. 100 illus., 46 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13509 |
|
505 | 0 | _aSignatures -- Idealized Models -- Lower Bounds -- Cryptanalysis II -- Distributed Algorithms -- Secure Hash Functions -- Post-quantum Cryptography -- Symmetric Cryptanalysis. | |
520 | _aThe 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. . | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aDodis, Yevgeniy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992243 |
|
700 | 1 |
_aShrimpton, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992244 |
|
710 | 2 |
_aSpringerLink (Online service) _992245 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031159817 |
776 | 0 | 8 |
_iPrinted edition: _z9783031159831 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13509 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-15982-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86763 _d86763 |