Advances in cryptology - CRYPTO 2021...
CRYPTO (Conference) (2021 :)

FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.. Part III /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advances in cryptology - CRYPTO 2021/ edited by Tal Malkin, Chris Peikert.
    其他題名: 41st Annual International Cryptology Conference, CRYPTO 2021, virtual event, August 16-20, 2021 : proceedings.
    其他題名: CRYPTO 2021
    其他作者: Malkin, Tal.
    團體作者: CRYPTO (Conference)
    出版者: Cham :Springer International Publishing : : 2021.,
    面頁冊數: xv, 810 p. :ill., digital ;24 cm.
    內容註: Models -- A Rational Protocol Treatment of 51% Attacks -- MoSS: Modular Security Specifications Framework -- Tight State-Restoration Soundness in the Algebraic Group Model -- Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model -- Applied Cryptography and Side Channels -- Provable Security Analysis of FIDO2-. SSE and SSD: Page-Efficient Searchable Symmetric Encryption -- Towards Tight Random Probing Security -- Secure Wire Shuffling in the Probing Model -- Cryptanalysis -- Differential-Linear Cryptanalysis from an Algebraic Perspective -- Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks -- Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting -- Thinking Outside the Superbox -- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques -- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 -- Improved torsion-point attacks on SIDH variants -- Codes and Extractors -- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN -- Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes -- Non-Malleable Codes for Bounded Parallel-Time Tampering -- Improved Computational Extractors and their Applications -- Adaptive Extractors and their Application to Leakage Resilient Secret Sharing -- Secret Sharing -- Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n -- Asymptotically-Good Arithmetic Secret Sharing over ℤ/pℓℤ with Strong Multiplication and Its Applications to Efficient MPC -- Large Message Homomorphic Secret Sharing from DCR and Applications -- Traceable Secret Sharing and Applications -- Quadratic Secret Sharing and Conditional Disclosure of Secrets -- Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-84252-9
    ISBN: 9783030842529
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入