Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Cryptology - ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 13093
  • Izdošanas datums: 30-Nov-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030920685
  • Formāts - PDF+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 13093
  • Izdošanas datums: 30-Nov-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030920685

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic.





The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows:





Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security;





Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols;





Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search;





Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
NTRU Fatigue: How Stretched is Overstretched?.- Faster Dual Lattice
Attacks for Solving LWE -- with applications to CRYSTALS.- Lattice sieving
via quantum random walks.- A Systematic Approach and Analysis of Key Mismatch
Attacks on Lattice-Based NIST Candidate KEMs.- Gladius: LWR based efficient
hybrid public key encryption with distributed decryption.- Lattice-Based
Group Encryption with Full Dynamicity and Message Filtering Policy.- A New
Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV.- Shorter
Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other
Optimizations.- Séta: Supersingular Encryption from Torsion Attacks.- SHealS
and HealS: isogeny-based PKEs from a key validation method for SIDH.-
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from
Search Assumptions in Bilinear Groups.- Public Key Encryption with Flexible
Pattern Matching.- Bounded Collusion ABE for TMs from IBE.- Digital
Signatures with Memory-Tight Security in the Multi-Challenge Setting.-
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.-
Boosting the Security of Blind Signature Schemes.- PrORAM: Fast O(log n)
Authenticated Shares ZK ORAM.- Compressed Sigma-Protocols for Bilinear Group
Arithmetic Circuits and Application to Logarithmic Transparent Threshold
Signatures.- Promise $\Sigma$-protocol: How to Construct Efficient Threshold
ECDSA from Encryptions Based on Class Groups.- The One-More Discrete
Logarithm Assumption in the Generic Group Model.- Verifiably-Extractable OWFs
and Their Applications to Subversion Zero-Knowledge.- Chain Reductions for
Multi-Signatures and the HBMS Scheme.- Symmetric Key Exchange with Full
Forward Security and Robust Synchronization.- Security Analysis of CPace.-
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.