Advances in cryptology - ASIACRYPT 2...
International Conference on the Theory and Application of Cryptology and Information Security (2020 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - ASIACRYPT 2020 = 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advances in cryptology - ASIACRYPT 2020/ edited by Shiho Moriai, Huaxiong Wang.
    Reminder of title: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings.
    remainder title: ASIACRYPT 2020
    other author: Moriai, Shiho.
    corporate name: International Conference on the Theory and Application of Cryptology and Information Security
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xv, 818 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-64834-3
    ISBN: 9783030648343
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login