Theory of cryptography = 19th Intern...
Theory of Cryptography Conference (2021 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Theory of cryptography = 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Theory of cryptography/ edited by Kobbi Nissim, Brent Waters.
    Reminder of title: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021 : proceedings.
    remainder title: TCC 2021
    other author: Nissim, Kobbi.
    corporate name: Theory of Cryptography Conference
    Published: Cham :Springer International Publishing : : 2021.,
    Description: xii, 753 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments -- On Communication-E cient Asynchronous MPC with Adaptive Security -- Efficient Perfectly Secure Computation with Optimal Resilience -- On Communication Models and Best-Achievable Security in Two-Round MPC -- Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation -- Blockchains Enable Non-Interactive MPC -- Multi-party PSM, Revisited: Improved Communication and Unbalanced Communication -- Multi-Party Functional Encryption -- Succinct LWE Sampling, Random Polynomials, and Obfuscation -- ABE for DFA from LWE against Bounded Collusions, Revisited -- Distributed Merkle's Puzzles -- Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity -- Disappearing Cryptography in the Bounded Storage Model -- Trojan-Resilience without Cryptography -- On Derandomizing Yao's Weak-to-Strong OWF Construction -- Simple Constructions from (Almost) Regular One-Way Functions -- On Treewidth, Separators and Yao's Garbling -- Oblivious Transfer from Trapdoor Permutations in Minimal Rounds -- The Cost of Adaptivity in Security Games on Graphs -- Concurrent Composition of Differential Privacy -- Direct Product Hardness Amplifcation -- On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger -- BKW Meets Fourier: New Algorithms for LPN with Sparse Parities -- Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy -- Polynomial-time targeted attacks on coin-tossing for any number of corruptions.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-90453-1
    ISBN: 9783030904531
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9414348 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 T44 2021 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login