Advances in Cryptology - CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV
Advances in Cryptology - CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV
YOU SAVE £7.09
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
- More about Advances in Cryptology - CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV
The 4-volume sets LNCS 13507, 13508, 13509, and 13510 contain the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The papers were organized in various topical sections, including cryptanalysis, randomness, quantum cryptography, advanced encryption systems, secure messaging, lattice-based zero knowledge, lattice-based signatures, blockchain, coding theory, public key cryptography, signatures, idealized models, lower bounds, secure hash functions, post-quantum cryptography, symmetric cryptanalysis, secret sharing, and secure multiparty computation.
Format: Paperback / softback
Length: 583 pages
Publication date: 12 October 2022
Publisher: Springer International Publishing AG
The 4-volume sets LNCS 13507, 13508, 13509, and 13510 comprise the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which took place in Santa Barbara, CA, USA, in August 2022. A comprehensive review and selection process resulted in the inclusion of a total of 100 papers in the proceedings, out of 455 submissions. These papers were organized into the following topical sections:
Cryptanalysis: This section encompasses research on analyzing cryptographic systems and protocols to identify weaknesses and vulnerabilities. It includes topics such as cryptographic algorithms, encryption schemes, and security protocols.
Randomness: Randomness plays a crucial role in cryptography, as it ensures the security of cryptographic operations. This section explores various sources of randomness, such as physical phenomena, random number generators, and cryptographic protocols.
Quantum Cryptography: Quantum cryptography utilizes the principles of quantum mechanics to provide secure communication and cryptographic algorithms. This section covers topics such as quantum key distribution, quantum cryptography protocols, and quantum information theory.
Advanced Encryption Systems: This section focuses on developing and evaluating advanced encryption systems that provide enhanced security and privacy. It includes topics such as symmetric encryption, public-key encryption, and key management systems.
Secure Messaging: Secure messaging is essential for protecting the confidentiality and integrity of communication. This section explores various secure messaging protocols, such as end-to-end encryption, message authentication codes, and secure communication channels.
Lattice-Based Zero Knowledge: Lattice-based zero knowledge (LZK) is a cryptographic technique that allows one party to prove knowledge of a secret without revealing it. This section covers topics such as LZK protocols, LZK proofs, and applications of LZK in cryptography.
Lattice-Based Signatures: Lattice-based signatures are a cryptographic technique that uses lattices to generate and verify signatures. This section covers topics such as lattice-based signature schemes, signature verification algorithms, and applications of lattice-based signatures.
Blockchain: Blockchain is a distributed ledger technology that enables secure and transparent transactions. This section covers topics such as blockchain architecture, consensus algorithms, and applications of blockchain in various industries.
Coding Theory: Coding theory is a fundamental aspect of cryptography, as it provides tools for encoding and decoding messages. This section covers topics such as error-correcting codes, cryptographic codes, and information theory.
Public Key Cryptography: Public key cryptography is a cryptographic technique that uses public keys to generate and verify digital signatures. This section covers topics such as public key encryption, key exchange protocols, and certificate authorities.
Signatures, Idealized Models, Lower Bounds: Signatures, idealized models, and lower bounds are fundamental concepts in cryptography that provide insights into the security and efficiency of cryptographic systems. This section covers topics such as signature schemes, signature verification algorithms, and security assumptions.
Secure Hash Functions: Secure hash functions are essential for cryptographic applications, as they provide a means of securely generating hash values. This section covers topics such as hash functions, hash-based cryptographic protocols, and hash-based message authentication codes.
Post-Quantum Cryptography: Post-quantum cryptography is a new area of cryptography that aims to develop cryptographic systems that are resistant to quantum attacks. This section covers topics such as post-quantum cryptographic algorithms, quantum cryptography protocols, and quantum information theory.
Symmetric Cryptanalysis: Symmetric cryptanalysis is a cryptographic technique that analyzes the security of symmetric encryption algorithms. This section covers topics such as symmetric encryption algorithms, key recovery algorithms, and ciphertext-only attacks.
Secret Sharing and Secure Multiparty Computation: Secret sharing and secure multiparty computation are cryptographic techniques that enable multiple parties to share a secret without revealing it to others. This section covers topics such as secret sharing protocols, secure multiparty computation protocols, and applications of secret sharing and secure multiparty computation.
Unique Topics: This section includes papers on unique and innovative topics in cryptography. It covers topics such as quantum cryptography, blockchain-based cryptography, and privacy-preserving cryptography.
Symmetric Key Theory: Symmetric key theory is a fundamental aspect of cryptography, as it provides the basis for symmetric encryption algorithms. This section covers topics such as symmetric encryption algorithms, key generation algorithms, and key distribution algorithms.
Zero Knowledge: Zero knowledge is a cryptographic technique that allows one party to prove knowledge of a secret without revealing it. This section covers topics such as zero knowledge protocols, zero knowledge proofs, and applications of zero knowledge in cryptography.
Threshold Signatures: Threshold signatures are a cryptographic technique that allows a group of signers to generate a signature collectively. This section covers topics such as threshold signature schemes, threshold signature verification algorithms, and applications of threshold signatures.
In conclusion, the 4-volume sets LNCS 13507, 13508, 13509, and 13510 represent a comprehensive collection of research papers presented at CRYPTO 2022, covering a wide range of topics in cryptography. These proceedings provide valuable insights into the latest advancements and developments in the field, and they will be of great interest to researchers, practitioners, and policymakers in the area of cryptography.
Weight: 914g
Dimension: 235 x 155 (mm)
ISBN-13: 9783031159848
Edition number: 1st ed. 2022
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.