Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptology and network security = 22...
~
International Conference on Cryptology and Network Security (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Cryptology and network security = 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptology and network security/ edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann.
Reminder of title:
22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /
remainder title:
CANS 2023
other author:
Deng, Jing.
corporate name:
International Conference on Cryptology and Network Security
Published:
Singapore :Springer Nature Singapore : : 2023.,
Description:
xix, 590 p. :ill., digital ;24 cm.
[NT 15003449]:
Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures -
Online resource:
https://doi.org/10.1007/978-981-99-7563-1
ISBN:
9789819975631
Cryptology and network security = 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /
Cryptology and network security
22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /[electronic resource] :CANS 2023edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann. - Singapore :Springer Nature Singapore :2023. - xix, 590 p. :ill., digital ;24 cm. - Lecture notes in computer science,143420302-9743 ;. - Lecture notes in computer science ;14342..
Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
ISBN: 9789819975631
Standard No.: 10.1007/978-981-99-7563-1doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25 / I58 2023
Dewey Class. No.: 005.824
Cryptology and network security = 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /
LDR
:03619nmm a2200373 a 4500
001
2335308
003
DE-He213
005
20231030202028.0
006
m d
007
cr nn 008maaau
008
240402s2023 si s 0 eng d
020
$a
9789819975631
$q
(electronic bk.)
020
$a
9789819975624
$q
(paper)
024
7
$a
10.1007/978-981-99-7563-1
$2
doi
035
$a
978-981-99-7563-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2023
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
I61 2023
111
2
$a
International Conference on Cryptology and Network Security
$n
(22nd :
$d
2023 :
$c
Augusta, Ga.)
$3
3667612
245
1 0
$a
Cryptology and network security
$h
[electronic resource] :
$b
22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023 : proceedings /
$c
edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann.
246
3
$a
CANS 2023
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2023.
300
$a
xix, 590 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14342
505
0
$a
Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
520
$a
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Deng, Jing.
$3
1287264
700
1
$a
Kolesnikov, Vladimir.
$3
3529644
700
1
$a
Schwarzmann, Alexander A.
$3
2160121
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14342.
$3
3667613
856
4 0
$u
https://doi.org/10.1007/978-981-99-7563-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9461513
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I58 2023
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login