Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Cryptology - ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I

Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13090
  • Izdošanas datums: 30-Nov-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030920623
  • Formāts - EPUB+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13090
  • Izdošanas datums: 30-Nov-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030920623

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic.





The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows:





Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security;





Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols;





Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search;





Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.

On the Hardness of the NTRU problem.- A Geometric Approach to Linear Cryptanalysis.- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation.- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.- A formula for disaster: a unified approach to elliptic curve special-point-based attacks.- Cryptanalysis of an oblivious PRF from supersingular isogenies.- A Practical Key-Recovery Attack on 805-Round Trivium.- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.- Clustering Effect in Simon and Simeck.- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair.- Convexity of division property transitions: theory, algorithms and compact models.- Strong and Tight Security Guarantees against Integral Distinguishers.- Massive Superpoly Recovery with Nested Monomial Predictions.- Quantum Linearization Attacks.- Generic Framework forKey-Guessing Improvements.- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model.- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.- Franchised Quantum Money.- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP.- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.- Tight adaptive reprogramming in the QROM.- QCB: Efficient Quantum-secure Authenticated Encryption.