Advances in cryptology - CRYPTO 2019...
CRYPTO (Conference) (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - CRYPTO 2019 = 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advances in cryptology - CRYPTO 2019/ edited by Alexandra Boldyreva, Daniele Micciancio.
    Reminder of title: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019 : proceedings.
    remainder title: CRYPTO 2019
    other author: Boldyreva, Alexandra.
    corporate name: CRYPTO (Conference)
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xv, 861 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: MPC Communication Complexity -- The Communication Complexity of Threshold Private Set Intersection -- Adaptively Secure MPC with Sublinear Communication Complexity -- Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing -- Communication-Efficient Unconditional MPC with Guaranteed Output Delivery -- Symmetric Cryptanalysis -- Efficient Collision Attack Frameworks for RIPEMD-160 -- Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning -- Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS -- Low Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem -- (Post) Quantum Cryptography -- How to Record Quantum Queries, and Applications to Quantum Indifferentiability -- Quantum security proofs using semi-classical oracles -- Quantum Indistinguishability of Random Sponges -- Revisiting Post-Quantum Fiat-Shamir -- Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model -- Leakage Resilience -- Unconditionally Secure Computation Against Low-Complexity Leakage -- Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System -- Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate -- Leakage Resilient Secret Sharing and Applications -- Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures -- Memory Hard Functions and Privacy Amplification -- Memory-Hard Functions from Cryptographic Primitives -- Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions -- Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge -- The Privacy Blanket of the Shuffle Model -- Attribute Based Encryption -- Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption -- Match Me if You Can: Matchmaking Encryption and its Applications -- ABE for DFA from k-Lin -- Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE -- Foundations -- The Distinction Between Fixed and Random Generators in Group-Based Assumptions -- Unifying computational entropies via Kullback-Leibler divergence.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-26951-7
    ISBN: 9783030269517
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9403797 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C79 2019 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login