Advances in cryptology - CRYPTO 2021...
CRYPTO (Conference) (2021 :)

FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.. Part IV /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advances in cryptology - CRYPTO 2021/ edited by Tal Malkin, Chris Peikert.
    其他題名: 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.
    其他題名: CRYPTO 2021
    其他作者: Malkin, Tal.
    團體作者: CRYPTO (Conference)
    出版者: Cham :Springer International Publishing : : 2021.,
    面頁冊數: xv, 732 p. :ill., digital ;24 cm.
    內容註: Zero Knowledge -- Witness Authenticating NIZKs and Applications -- Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs -- Compressing Proofs of k-Out-Of-n Partial Knowledge -- Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions -- Time- and Space-Efficient Arguments from Groups of Unknown Order -- Encryption++ -- Broadcast Encryption with Size N1/3 and More from k-Lin -- Fine-grained Secure Attribute-based Encryption -- Multi-Input Quadratic Functional Encryption from Pairings -- Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE -- Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved -- Foundations -- White Box Traitor Tracing -- Does Fiat-Shamir Require a Cryptographic Hash Function? -- Composition with Knowledge Assumptions -- Non-Interactive Batch Arguments for NP from Standard Assumptions -- Targeted Lossy Functions and Applications -- The t-wise Independence of Substitution-Permutation Networks -- Low-Complexity Cryptography -- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2] -- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications -- No Time to Hash: On Super-Efficient Entropy Accumulation -- Protocols -- A Logarithmic Lower Bound for Oblivious RAM (for all parameters) -- Oblivious RAM with Worst-Case Logarithmic Overhead -- Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time -- Authenticated Key Exchange and Signatures with Tight Security in the Standard Model -- KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-84259-8
    ISBN: 9783030842598
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入