Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12492)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2020.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (27 papers)
-
Public Key Cryptography
-
Lattice-Based Cryptography
Other volumes
-
Advances in Cryptology – ASIACRYPT 2020
-
Advances in Cryptology – ASIACRYPT 2020
-
Advances in Cryptology – ASIACRYPT 2020
Keywords
About this book
The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.
Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.
Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2020
Book Subtitle: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Editors: Shiho Moriai, Huaxiong Wang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-64834-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2020
Softcover ISBN: 978-3-030-64833-6Published: 05 December 2020
eBook ISBN: 978-3-030-64834-3Published: 04 December 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XV, 818
Number of Illustrations: 107 b/w illustrations, 34 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Systems and Data Security, Information Systems Applications (incl. Internet), Computing Milieux