Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12493)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2020.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.
Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.
Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
Similar content being viewed by others
Keywords
Table of contents (29 papers)
-
Multi-party Computation
-
Secret Sharing
Other volumes
-
Advances in Cryptology – ASIACRYPT 2020
-
Advances in Cryptology – ASIACRYPT 2020
-
Advances in Cryptology – ASIACRYPT 2020
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2020
Book Subtitle: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III
Editors: Shiho Moriai, Huaxiong Wang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-64840-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2020
Softcover ISBN: 978-3-030-64839-8Published: 05 December 2020
eBook ISBN: 978-3-030-64840-4Published: 04 December 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XV, 904
Number of Illustrations: 122 b/w illustrations, 31 illustrations in colour
Topics: Cryptology, Systems and Data Security, Computer Communication Networks, Coding and Information Theory, Information Systems Applications (incl. Internet)