Advances in cryptology - ASIACRYPT 2...
International Conference on the Theory and Application of Cryptology and Information Security (2020 :)

FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - ASIACRYPT 2020 = 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advances in cryptology - ASIACRYPT 2020/ edited by Shiho Moriai, Huaxiong Wang.
    其他題名: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings.
    其他題名: ASIACRYPT 2020
    其他作者: Moriai, Shiho.
    團體作者: International Conference on the Theory and Application of Cryptology and Information Security
    出版者: Cham :Springer International Publishing : : 2020.,
    面頁冊數: xxvii, 914 p. :ill., digital ;24 cm.
    內容註: Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to Build Optimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-64837-4
    ISBN: 9783030648374
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入