Advances in cryptology - ASIACRYPT 2...
International Conference on the Theory and Application of Cryptology and Information Security (2021 :)

FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advances in cryptology - ASIACRYPT 2021/ edited by Mehdi Tibouchi, Huaxiong Wang.
    其他題名: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.
    其他題名: ASIACRYPT 2021
    其他作者: Tibouchi, Mehdi.
    團體作者: International Conference on the Theory and Application of Cryptology and Information Security
    出版者: Cham :Springer International Publishing : : 2021.,
    面頁冊數: xvii, 728 p. :ill., digital ;24 cm.
    內容註: Secure and Efficient Software Masking on Superscalar Pipelined Processors -- Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Cand -- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks -- Efficient Leakage-Resilient MACs without Idealized Assumptions -- DEFAULT: Cipher Level Resistance Against Differential Fault Attack -- Random Probing Expansion: Quasi Linear Gadgets \& Dynamic Compilers -- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials -- Improved single-round secure multiplication using regenerating codes -- Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation -- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation -- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH -- Reverse Firewalls for Adaptively Secure MPC without Setup -- On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups -- Astrolabous: A Universally Composable Time Lock Encryption Scheme -- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE -- Simulation-Based Bi-Selective Opening Security for Public Key Encryption -- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness -- Hierarchical Integrated Signature and Encryption -- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions -- Onion Routing with Replies -- Private Join and Compute from PIR with Default -- Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures -- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy -- Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-92075-3
    ISBN: 9783030920753
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9414385 電子資源 11.線上閱覽_V 電子書 EB QA76.9.D335 I57 2021 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入