Advances in cryptology - CRYPTO 2021...
CRYPTO (Conference) (2021 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.. Part III /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advances in cryptology - CRYPTO 2021/ edited by Tal Malkin, Chris Peikert.
    Reminder of title: 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.
    remainder title: CRYPTO 2021
    other author: Malkin, Tal.
    corporate name: CRYPTO (Conference)
    Published: Cham :Springer International Publishing : : 2021.,
    Description: xv, 810 p. :ill., digital ;24 cm.
    [NT 15003449]: Models -- A Rational Protocol Treatment of 51% Attacks -- MoSS: Modular Security Specifications Framework -- Tight State-Restoration Soundness in the Algebraic Group Model -- Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model -- Applied Cryptography and Side Channels -- Provable Security Analysis of FIDO2-. SSE and SSD: Page-Efficient Searchable Symmetric Encryption -- Towards Tight Random Probing Security -- Secure Wire Shuffling in the Probing Model -- Cryptanalysis -- Differential-Linear Cryptanalysis from an Algebraic Perspective -- Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks -- Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting -- Thinking Outside the Superbox -- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques -- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 -- Improved torsion-point attacks on SIDH variants -- Codes and Extractors -- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN -- Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes -- Non-Malleable Codes for Bounded Parallel-Time Tampering -- Improved Computational Extractors and their Applications -- Adaptive Extractors and their Application to Leakage Resilient Secret Sharing -- Secret Sharing -- Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n -- Asymptotically-Good Arithmetic Secret Sharing over ℤ/pℓℤ with Strong Multiplication and Its Applications to Efficient MPC -- Large Message Homomorphic Secret Sharing from DCR and Applications -- Traceable Secret Sharing and Applications -- Quadratic Secret Sharing and Conditional Disclosure of Secrets -- Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-84252-9
    ISBN: 9783030842529
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login