Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Topics in cryptology - CT-RSA 2025 =...
~
Cryptographers' Track at RSA Conference ((2025 :)
Linked to FindBook
Google Book
Amazon
博客來
Topics in cryptology - CT-RSA 2025 = Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Topics in cryptology - CT-RSA 2025/ edited by Arpita Patra.
Reminder of title:
Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
remainder title:
CT-RSA 2025
other author:
Patra, Arpita.
corporate name:
Cryptographers' Track at RSA Conference
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
x, 428 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs -- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT -- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer -- Comprehensive Robustness Analysis of GCM, CCM, and OCB3 -- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm against Unified Structures -- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction -- Simplified Adaptively Secure Threshold BLS Signatures -- Non-Interactive Threshold BBS+ From Pseudorandom Correlations -- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC -- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields -- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors -- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-88661-4
ISBN:
9783031886614
Topics in cryptology - CT-RSA 2025 = Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
Topics in cryptology - CT-RSA 2025
Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /[electronic resource] :CT-RSA 2025edited by Arpita Patra. - Cham :Springer Nature Switzerland :2025. - x, 428 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,155981611-3349 ;. - Lecture notes in computer science ;15598..
Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs -- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT -- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer -- Comprehensive Robustness Analysis of GCM, CCM, and OCB3 -- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm against Unified Structures -- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction -- Simplified Adaptively Secure Threshold BLS Signatures -- Non-Interactive Threshold BBS+ From Pseudorandom Correlations -- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC -- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields -- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors -- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28-May 1, 2025. The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.
ISBN: 9783031886614
Standard No.: 10.1007/978-3-031-88661-4doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25 / C79 2025
Dewey Class. No.: 005.824
Topics in cryptology - CT-RSA 2025 = Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
LDR
:03206nmm a2200373 a 4500
001
2409784
003
DE-He213
005
20250408035128.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031886614
$q
(electronic bk.)
020
$a
9783031886607
$q
(paper)
024
7
$a
10.1007/978-3-031-88661-4
$2
doi
035
$a
978-3-031-88661-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C79 2025
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
C957 2025
111
2
$a
Cryptographers' Track at RSA Conference
$d
(2025 :
$c
San Francisco, Calif.)
$3
3783209
245
1 0
$a
Topics in cryptology - CT-RSA 2025
$h
[electronic resource] :
$b
Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
$c
edited by Arpita Patra.
246
3
$a
CT-RSA 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
x, 428 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15598
505
0
$a
Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs -- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT -- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer -- Comprehensive Robustness Analysis of GCM, CCM, and OCB3 -- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm against Unified Structures -- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction -- Simplified Adaptively Secure Threshold BLS Signatures -- Non-Interactive Threshold BBS+ From Pseudorandom Correlations -- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC -- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields -- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors -- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.
520
$a
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28-May 1, 2025. The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Cryptography
$v
Congresses.
$3
622819
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Coding and Information Theory.
$3
891252
700
1
$a
Patra, Arpita.
$3
3269933
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15598.
$3
3783210
856
4 0
$u
https://doi.org/10.1007/978-3-031-88661-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9515282
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C79 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login