1 option
Theory of Cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I / edited by Eike Kiltz, Vinod Vaikuntanathan.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Lecture Notes in Computer Science, 1611-3349 ; 13747
- Language:
- English
- Subjects (All):
- Cryptography.
- Data encryption (Computer science).
- Data protection.
- Computer networks--Security measures.
- Computer networks.
- Computer systems.
- Data structures (Computer science).
- Information theory.
- Cryptology.
- Security Services.
- Mobile and Network Security.
- Computer Communication Networks.
- Computer System Implementation.
- Data Structures and Information Theory.
- Local Subjects:
- Cryptology.
- Security Services.
- Mobile and Network Security.
- Computer Communication Networks.
- Computer System Implementation.
- Data Structures and Information Theory.
- Physical Description:
- 1 online resource (748 pages)
- Edition:
- 1st ed. 2022.
- Place of Publication:
- Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
- Summary:
- The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
- Contents:
- Post-quantum cryptography
- Interactive proofs
- Quantum cryptography
- Secret-sharing and applications
- Succinct proofs
- Identity-based encryption and functional encryption
- Attribute-based encryption and functional encryption.
- Notes:
- Includes bibliographical references and index.
- Other Format:
- Print version: Kiltz, Eike Theory of Cryptography
- ISBN:
- 3-031-22318-7
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.