Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13177)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: PKC 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.
Similar content being viewed by others
Keywords
- advanced cryptography
- authentication
- computer networks
- computer security
- cryptanalysis
- cryptographic protocol
- cryptography
- data security
- encryption
- key exchange
- multi-party computation
- network protocols
- network security
- public key cryptography
- public key encryption
- secret sharing
- software engineering
- zero-knowledge proof
Table of contents (22 papers)
-
Cryptanalysis
-
Cryptographic Protocols
Other volumes
-
Public-Key Cryptography – PKC 2022
-
Public-Key Cryptography – PKC 2022
Editors and Affiliations
Bibliographic Information
Book Title: Public-Key Cryptography – PKC 2022
Book Subtitle: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I
Editors: Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-97121-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2022
Softcover ISBN: 978-3-030-97120-5Published: 27 February 2022
eBook ISBN: 978-3-030-97121-2Published: 26 February 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 648
Number of Illustrations: 32 b/w illustrations, 26 illustrations in colour
Topics: Cryptology, Computer Systems Organization and Communication Networks, Mobile and Network Security, Information Systems Applications (incl. Internet), Software Engineering