Applied cryptography and network sec...
ACNS (Conference) (2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Applied cryptography and network security = 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025 : proceedings.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Applied cryptography and network security/ edited by Marc Fischlin, Veelasha Moonsamy.
    Reminder of title: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025 : proceedings.
    remainder title: ACNS 2025
    other author: Fischlin, Marc.
    corporate name: ACNS (Conference)
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xxii, 599 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Encryption & Secret Sharing: Registered Matchmaking Encryption -- Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors -- Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices -- Pre-Constructed Publicly Verifiable Secret Sharing and Applications. Blockchains & Decentralized Systems: HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts -- Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment -- SoK: Measuring Blockchain Decentralization -- Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols -- Sassafras: Effcient Batch Single Leader Election. Multi-Party Computation: Oblivious suffx sorting: A multi-party computation scheme for secure and effcient suffx sorting -- Share&Shrink: Effcient and Delegatable MPC in one Broadcast then Asynchrony -- Delayed-Input Multi-Party Computation -- Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes. Network Security: Opening Pandora's Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing -- TAU: Trust via Asynchronous Updates for Satellite Network Resiliency. Cryptographic primitives and protocols: Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization -- Distributed Asynchronous Remote Key Generation -- Anonymous Authenticated Key Exchange -- Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor -- Tighter provable security for TreeKEM.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-95761-1
    ISBN: 9783031957611
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9518799 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A36 2025 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login