Topics in cryptology - CT-RSA 2025 =...
Cryptographers' Track at RSA Conference ((2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Topics in cryptology - CT-RSA 2025 = Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Topics in cryptology - CT-RSA 2025/ edited by Arpita Patra.
    Reminder of title: Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025 : proceedings /
    remainder title: CT-RSA 2025
    other author: Patra, Arpita.
    corporate name: Cryptographers' Track at RSA Conference
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: x, 428 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs -- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT -- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer -- Comprehensive Robustness Analysis of GCM, CCM, and OCB3 -- Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm against Unified Structures -- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction -- Simplified Adaptively Secure Threshold BLS Signatures -- Non-Interactive Threshold BBS+ From Pseudorandom Correlations -- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC -- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields -- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors -- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-88661-4
    ISBN: 9783031886614
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9515282 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C79 2025 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login