Advances in cryptology - ASIACRYPT 2...
International Conference on the Theory and Application of Cryptology and Information Security (2021 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Advances in cryptology - ASIACRYPT 2021 = 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Advances in cryptology - ASIACRYPT 2021/ edited by Mehdi Tibouchi, Huaxiong Wang.
    Reminder of title: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021 : proceedings.
    remainder title: ASIACRYPT 2021
    other author: Tibouchi, Mehdi.
    corporate name: International Conference on the Theory and Application of Cryptology and Information Security
    Published: Cham :Springer International Publishing : : 2021.,
    Description: xvii, 728 p. :ill., digital ;24 cm.
    [NT 15003449]: Secure and Efficient Software Masking on Superscalar Pipelined Processors -- Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Cand -- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks -- Efficient Leakage-Resilient MACs without Idealized Assumptions -- DEFAULT: Cipher Level Resistance Against Differential Fault Attack -- Random Probing Expansion: Quasi Linear Gadgets \& Dynamic Compilers -- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials -- Improved single-round secure multiplication using regenerating codes -- Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation -- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation -- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH -- Reverse Firewalls for Adaptively Secure MPC without Setup -- On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups -- Astrolabous: A Universally Composable Time Lock Encryption Scheme -- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE -- Simulation-Based Bi-Selective Opening Security for Public Key Encryption -- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness -- Hierarchical Integrated Signature and Encryption -- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions -- Onion Routing with Replies -- Private Join and Compute from PIR with Default -- Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures -- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy -- Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-92075-3
    ISBN: 9783030920753
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9414385 電子資源 11.線上閱覽_V 電子書 EB QA76.9.D335 I57 2021 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login