|
Showing 1 - 4 of
4 matches in All Departments
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093
constitutes the proceedings of the 27th International Conference on
the Theory and Application of Cryptology and Information Security,
ASIACRYPT 2021, which was held during December 6-10, 2021. The
conference was planned to take place in Singapore, but changed to
an online format due to the COVID-19 pandemic. The total of 95 full
papers presented in these proceedings was carefully reviewed and
selected from 341 submissions. The papers were organized in topical
sections as follows: Part I: Best paper awards; public-key
cryptanalysis; symmetric key cryptanalysis; quantum security; Part
II: physical attacks, leakage and countermeasures; multiparty
computation; enhanced public-key encryption and time-lock puzzles;
real-world protocols; Part III: NIZK and SNARKs; theory;
symmetric-key constructions; homomorphic encryption and encrypted
search; Part IV: Lattice cryptanalysis; post-quantum cryptography;
advanced encryption and signatures; zero-knowledge proofs,
threshold and multi-signatures; authenticated key exchange.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093
constitutes the proceedings of the 27th International Conference on
the Theory and Application of Cryptology and Information Security,
ASIACRYPT 2021, which was held during December 6-10, 2021. The
conference was planned to take place in Singapore, but changed to
an online format due to the COVID-19 pandemic. The total of 95 full
papers presented in these proceedings was carefully reviewed and
selected from 341 submissions. The papers were organized in topical
sections as follows: Part I: Best paper awards; public-key
cryptanalysis; symmetric key cryptanalysis; quantum security; Part
II: physical attacks, leakage and countermeasures; multiparty
computation; enhanced public-key encryption and time-lock puzzles;
real-world protocols; Part III: NIZK and SNARKs; theory;
symmetric-key constructions; homomorphic encryption and encrypted
search; Part IV: Lattice cryptanalysis; post-quantum cryptography;
advanced encryption and signatures; zero-knowledge proofs,
threshold and multi-signatures; authenticated key exchange.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093
constitutes the proceedings of the 27th International Conference on
the Theory and Application of Cryptology and Information Security,
ASIACRYPT 2021, which was held during December 6-10, 2021. The
conference was planned to take place in Singapore, but changed to
an online format due to the COVID-19 pandemic. The total of 95 full
papers presented in these proceedings was carefully reviewed and
selected from 341 submissions. The papers were organized in topical
sections as follows: Part I: Best paper awards; public-key
cryptanalysis; symmetric key cryptanalysis; quantum security; Part
II: physical attacks, leakage and countermeasures; multiparty
computation; enhanced public-key encryption and time-lock puzzles;
real-world protocols; Part III: NIZK and SNARKs; theory;
symmetric-key constructions; homomorphic encryption and encrypted
search; Part IV: Lattice cryptanalysis; post-quantum cryptography;
advanced encryption and signatures; zero-knowledge proofs,
threshold and multi-signatures; authenticated key exchange.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093
constitutes the proceedings of the 27th International Conference on
the Theory and Application of Cryptology and Information Security,
ASIACRYPT 2021, which was held during December 6-10, 2021. The
conference was planned to take place in Singapore, but changed to
an online format due to the COVID-19 pandemic. The total of 95 full
papers presented in these proceedings was carefully reviewed and
selected from 341 submissions. The papers were organized in topical
sections as follows: Part I: Best paper awards; public-key
cryptanalysis; symmetric key cryptoanalysis; quantum security; Part
II: physical attacks, leakage and countermeasures; multiparty
computation; enhanced public-key encryption and time-lock puzzles;
real-world protocols; Part III: NIZK and SNARKs; theory;
symmetric-key constructions; homomorphic encryption and encrypted
search; Part IV: Lattice cryptanalysis; post-quantum cryptography;
advanced encryption and signatures; zero-knowledge proofs,
threshold and multi-signatures; authenticated key exchange.
|
|