Advances in Cryptology - ASIACRYPT 2013
Title | Advances in Cryptology - ASIACRYPT 2013 PDF eBook |
Author | Kazue Sako |
Publisher | Springer |
Total Pages | 567 |
Release | 2013-11-23 |
Genre | Computers |
ISBN | 3642420338 |
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Advances in Cryptology -- ASIACRYPT 2013
Title | Advances in Cryptology -- ASIACRYPT 2013 PDF eBook |
Author | Kazue Sako |
Publisher | Springer |
Total Pages | 562 |
Release | 2013-11-23 |
Genre | Computers |
ISBN | 3642420451 |
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Advances in Cryptology – CRYPTO 2013
Title | Advances in Cryptology – CRYPTO 2013 PDF eBook |
Author | Ran Canetti |
Publisher | Springer |
Total Pages | 590 |
Release | 2013-08-15 |
Genre | Computers |
ISBN | 3642400418 |
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption.
Advances in Cryptology – ASIACRYPT 2015
Title | Advances in Cryptology – ASIACRYPT 2015 PDF eBook |
Author | Tetsu Iwata |
Publisher | Springer |
Total Pages | 809 |
Release | 2015-11-26 |
Genre | Computers |
ISBN | 3662488000 |
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
Advances in Cryptology – ASIACRYPT 2022
Title | Advances in Cryptology – ASIACRYPT 2022 PDF eBook |
Author | Shweta Agrawal |
Publisher | Springer Nature |
Total Pages | 812 |
Release | 2023-01-24 |
Genre | Computers |
ISBN | 303122969X |
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Advances in Cryptology - Asiacrypt 2013
Title | Advances in Cryptology - Asiacrypt 2013 PDF eBook |
Author | Kazue Sako |
Publisher | |
Total Pages | 572 |
Release | 2013-12-10 |
Genre | |
ISBN | 9783642420344 |
Advances in Cryptology – ASIACRYPT 2019
Title | Advances in Cryptology – ASIACRYPT 2019 PDF eBook |
Author | Steven D. Galbraith |
Publisher | Springer Nature |
Total Pages | 766 |
Release | 2019-11-22 |
Genre | Computers |
ISBN | 3030346188 |
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.