My Account Log in

1 option

Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Watanabe, Yohei, editor.
Hanaoka, Goichiro, editor.
Shikata, Junji, editor.
Series:
Security and Cryptology, 2946-1863 ; 13177
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Computer engineering.
Computer networks.
Computer networks--Security measures.
Application software.
Software engineering.
Cryptology.
Computer Engineering and Networks.
Mobile and Network Security.
Computer and Information Systems Applications.
Software Engineering.
Local Subjects:
Cryptology.
Computer Engineering and Networks.
Mobile and Network Security.
Computer and Information Systems Applications.
Software Engineering.
Physical Description:
1 online resource (655 pages)
Edition:
1st ed. 2022.
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
Summary:
The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic. The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
Contents:
Cryptanalysis
Multitarget decryption failure attacks and their application to Saber and Kyber
Post-quantum Security of Plain OAEP Transform
On the security of OSIDH
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes
Syndrome Decoding Estimator
On the Isogeny Problem with Torsion Point Information
MPC and Secret Sharing
Reusable Two-Round MPC from LPN
On the Bottleneck Complexity of MPC with Correlated Randomness
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
Fast Batched DPSS and its Applications
CNF-FSS and its Applications
Cryptographic Protocols
Effcient Verifiable Partially-Decryptable Commitments from Lattices and Applications
Making Private Function Evaluation Safer, Faster, and Simpler
Two-Round Oblivious Linear Evaluation from Learning with Errors
Improved Constructions of Anonymous Credentials From StructurePreserving Signatures on Equivalence Classes
Traceable PRFs: Full Collusion Resistance andActive Security
Tools
Radical Isogenies on Montgomery Curves
Towards a Simpler Lattice Gadget Toolkit
SNARKs and NIZKs
Polynomial IOPs for Linear Algebra Relations
A Unified Framework for Non-Universal SNARKs
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Rational Modular Encoding in the DCR Setting: Non-Interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. .
Notes:
Includes bibliographical references and index.
Other Format:
Print version: Hanaoka, Goichiro Public-Key Cryptography - PKC 2022
ISBN:
3-030-97121-X
OCLC:
1300781410

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account