Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Public-key cryptography - PKC 2025 =...
~
International Workshop on Practice and Theory in Public Key Cryptography (2025 :)
Linked to FindBook
Google Book
Amazon
博客來
Public-key cryptography - PKC 2025 = 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.. Part IV /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Public-key cryptography - PKC 2025/ edited by Tibor Jager, Jiaxin Pan.
Reminder of title:
28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.
remainder title:
PKC 2025
other author:
Jager, Tibor.
corporate name:
International Workshop on Practice and Theory in Public Key Cryptography
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xiv, 415 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Secure Computation: Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal -- Securely Instantiating 'Half Gates' Garbling in the Standard Model -- Effcient Permutation Correlations and Batched Random Access for Two-Party Computation -- Π: A Unified Framework for Computational Verifiable Secret Sharing. Security against Real-World Attacks: Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters -- Public-Algorithm Substitution Attacks: Subverting Hashing and Verification -- Kleptographic Attacks against Implicit Rejection -- Deny Whatever You Want: Dual-Deniable Public-Key Encryption. Batch Arguments and Decentralized Encryption: Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity -- Chosen Ciphertext Security via BARGs -- Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security -- Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model.
Contained By:
Springer Nature eBook
Subject:
Public key cryptography - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-91829-2
ISBN:
9783031918292
Public-key cryptography - PKC 2025 = 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.. Part IV /
Public-key cryptography - PKC 2025
28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.Part IV /[electronic resource] :PKC 2025edited by Tibor Jager, Jiaxin Pan. - Cham :Springer Nature Switzerland :2025. - xiv, 415 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,156771611-3349 ;. - Lecture notes in computer science ;15677..
Secure Computation: Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal -- Securely Instantiating 'Half Gates' Garbling in the Standard Model -- Effcient Permutation Correlations and Batched Random Access for Two-Party Computation -- Π: A Unified Framework for Computational Verifiable Secret Sharing. Security against Real-World Attacks: Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters -- Public-Algorithm Substitution Attacks: Subverting Hashing and Verification -- Kleptographic Attacks against Implicit Rejection -- Deny Whatever You Want: Dual-Deniable Public-Key Encryption. Batch Arguments and Decentralized Encryption: Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity -- Chosen Ciphertext Security via BARGs -- Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security -- Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model.
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12-15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
ISBN: 9783031918292
Standard No.: 10.1007/978-3-031-91829-2doiSubjects--Topical Terms:
849437
Public key cryptography
--Congresses.
LC Class. No.: QA76.9.A25 / I58 2025
Dewey Class. No.: 005.824
Public-key cryptography - PKC 2025 = 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.. Part IV /
LDR
:03008nmm a2200373 a 4500
001
2409845
003
DE-He213
005
20250506130006.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031918292
$q
(electronic bk.)
020
$a
9783031918285
$q
(paper)
024
7
$a
10.1007/978-3-031-91829-2
$2
doi
035
$a
978-3-031-91829-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2025
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM083000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
I61 2025
111
2
$a
International Workshop on Practice and Theory in Public Key Cryptography
$n
(28th :
$d
2025 :
$c
Røros, Norway)
$3
3783343
245
1 0
$a
Public-key cryptography - PKC 2025
$h
[electronic resource] :
$b
28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025 : proceedings.
$n
Part IV /
$c
edited by Tibor Jager, Jiaxin Pan.
246
3
$a
PKC 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiv, 415 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15677
505
0
$a
Secure Computation: Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal -- Securely Instantiating 'Half Gates' Garbling in the Standard Model -- Effcient Permutation Correlations and Batched Random Access for Two-Party Computation -- Π: A Unified Framework for Computational Verifiable Secret Sharing. Security against Real-World Attacks: Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters -- Public-Algorithm Substitution Attacks: Subverting Hashing and Verification -- Kleptographic Attacks against Implicit Rejection -- Deny Whatever You Want: Dual-Deniable Public-Key Encryption. Batch Arguments and Decentralized Encryption: Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity -- Chosen Ciphertext Security via BARGs -- Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security -- Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model.
520
$a
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12-15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
650
0
$a
Public key cryptography
$v
Congresses.
$3
849437
650
1 4
$a
Cryptology.
$3
3382308
700
1
$a
Jager, Tibor.
$3
3783344
700
1
$a
Pan, Jiaxin.
$3
3783345
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15677.
$3
3783346
856
4 0
$u
https://doi.org/10.1007/978-3-031-91829-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9515343
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I58 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login