Progress in cryptology - AFRICACRYP...
International Conference on Cryptology in Africa (2020 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Progress in cryptology - AFRICACRYPT 2020 = 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 - 22, 2020 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Progress in cryptology - AFRICACRYPT 2020/ edited by Abderrahmane Nitaj, Amr Youssef.
    Reminder of title: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 - 22, 2020 : proceedings /
    remainder title: AFRICACRYPT 2020
    other author: Nitaj, Abderrahmane.
    corporate name: International Conference on Cryptology in Africa
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xi, 453 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: QA-NIZK Arguments of Same Opening for Bilateral Commitments -- Signatures of Knowledge for Boolean Circuits under Standard Assumptions -- LESS is More: Code-Based Signatures without Syndromes -- UC Updatable Databases and Applications -- Symmetric Key Cryptography -- Impossible Di erential Cryptanalysis of Reduced-Round Tweakable TWINE -- MixColumns Coe cient Property and Security of the AES with A Secret S-Box -- New Results on the SymSum Distinguisher on Round-Reduced SHA3 -- Cryptanalysis of FlexAEAD -- BBB Secure Nonce Based MAC Using Public Permutations -- Elliptic Curves -- On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol -- A SAT-Based Approach for Index Calculus on Binary Elliptic Curves -- Post Quantum Cryptography -- Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security -- LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 -- Lattice Based Cryptography -- Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression -- Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP -- Side Channel Attacks -- Online Template Attack On ECDSA: Extracting Keys Via The Other Side -- When similarities among devices are taken for granted: Another look at portability -- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF -- Attacking RSA Using an Arbitrary Parameter -- New Algorithms and Schemes -- A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder -- New Ideas to Build Noise-Free Homomorphic Cryptosystems -- Zero Knowledge.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-51938-4
    ISBN: 9783030519384
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login