Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Cryptology - CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part II

  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12171
  • Izdošanas datums: 12-Aug-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030568801
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12171
  • Izdošanas datums: 12-Aug-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030568801

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 1721, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.





The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:





Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.







Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.





Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge. 
Public Key Cryptanalysis- A Polynomial-Time Algorithm for Solving the
Hidden Subset Sum Problem.- Asymptotic complexities of discrete logarithm
algorithms in pairing-relevant finite fields.- Comparing the difficulty of
factorization and discrete logarithm: a 240-digit experiment.- Breaking the
decisional Diffie-Hellman problem for class group actions using genus
theory.- A Classification of Computational Assumptions in the Algebraic Group
Model.- Lattice Algorithms and Cryptanalysis.- Fast reduction of algebraic
lattices over cyclotomic fields.- Faster Enumeration-based Lattice Reduction:
Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).- Lattice Reduction for
Modules, or How to Reduce ModuleSVP to ModuleSVP.- Random Self-reducibility
of Ideal-SVP via Arakelov Random Walks.- Slide Reduction, RevisitedÄīFilling
the Gaps in SVP Approximation.- Rounding in the Rings.- Lattice-based and
post-quantum cryptography.- LWE with Side Information: Attacks and Concrete
Security Estimation.- A key-recovery timing attack on post-quantum primitives
using the Fujisaki-Okamoto transformation and its application on FrodoKEM.-
Efficient Pseudorandom Correlation Generators from Ring-LPN.- Scalable
Pseudorandom Quantum States.- A non-PCP Approach to Succinct Quantum-Safe
Zero-Knowledge.- Practical Product Proofs for Lattice
Commitments.-Lattice-Based Blind Signatures, Revisited.- Multi-Party
Computation.- 12171     Round-optimal Black-box Commit-and-prove with
Succinct Communication.- Efficient Constant-Round MPC with Identifiable Abort
and Public Verifiability.- Black-box use of One-way Functions is Useless for
Optimal Fair Coin-Tossing.- Guaranteed Output Delivery Comes Free in Honest
Majority MPC.- Black-Box Transformations from Passive to Covert Security with
Public Verifiability.- MPC with Friends and Foes.- Always Have a Backup Plan:
Fully Secure Synchronous MPC with Asynchronous Fallback.- Reverse Firewalls
for Actively SecureMPCs.- Stacked Garbling: Garbled Circuit Proportional to
Longest Execution Path.- Better Concrete Security for Half-Gates Garbling (in
the Multi-Instance Setting).- Improved Primitives for MPC over Mixed
Arithmetic-Binary Circuits.