語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in cryptology - ASIACRYPT 2...
~
International Conference on the Theory and Application of Cryptology and Information Security (2021 :)
FindBook
Google Book
Amazon
博客來
Advances in cryptology - ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.. Part I /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advances in cryptology - ASIACRYPT 2021/ edited by Mehdi Tibouchi, Huaxiong Wang.
其他題名:
27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.
其他題名:
ASIACRYPT 2021
其他作者:
Tibouchi, Mehdi.
團體作者:
International Conference on the Theory and Application of Cryptology and Information Security
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xxiii, 699 p. :ill. (some col.), digital ;24 cm.
內容註:
On the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework for Key-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption.
Contained By:
Springer Nature eBook
標題:
Data encryption (Computer science) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-92062-3
ISBN:
9783030920623
Advances in cryptology - ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.. Part I /
Advances in cryptology - ASIACRYPT 2021
27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.Part I /[electronic resource] :ASIACRYPT 2021edited by Mehdi Tibouchi, Huaxiong Wang. - Cham :Springer International Publishing :2021. - xxiii, 699 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,130900302-9743 ;. - Lecture notes in computer science ;13090..
On the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework for Key-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
ISBN: 9783030920623
Standard No.: 10.1007/978-3-030-92062-3doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.D335 / I58 2021
Dewey Class. No.: 005.824
Advances in cryptology - ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.. Part I /
LDR
:04023nmm 22003735a 4500
001
2258776
003
DE-He213
005
20211130133332.0
006
m d
007
cr nn 008maaau
008
220422s2021 sz s 0 eng d
020
$a
9783030920623
$q
(electronic bk.)
020
$a
9783030920616
$q
(paper)
024
7
$a
10.1007/978-3-030-92062-3
$2
doi
035
$a
978-3-030-92062-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.D335
$b
I58 2021
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.D335
$b
I61 2021
111
2
$a
International Conference on the Theory and Application of Cryptology and Information Security
$n
(27th :
$d
2021 :
$c
Online)
$3
3531563
245
1 0
$a
Advances in cryptology - ASIACRYPT 2021
$h
[electronic resource] :
$b
27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.
$n
Part I /
$c
edited by Mehdi Tibouchi, Huaxiong Wang.
246
3
$a
ASIACRYPT 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xxiii, 699 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13090
490
1
$a
Security and cryptology
505
0
$a
On the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework for Key-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption.
520
$a
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Tibouchi, Mehdi.
$3
3531564
700
1
$a
Wang, Huaxiong.
$3
845563
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13090.
$3
3531565
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-92062-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9414383
電子資源
11.線上閱覽_V
電子書
EB QA76.9.D335 I58 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入