Atjaunināt sīkdatņu piekrišanu

Progress in Cryptology INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 1215, 2021, Proceedings 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 634 pages, height x width: 235x155 mm, weight: 991 g, 51 Illustrations, color; 79 Illustrations, black and white; XIX, 634 p. 130 illus., 51 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 13143
  • Izdošanas datums: 09-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303092517X
  • ISBN-13: 9783030925178
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 634 pages, height x width: 235x155 mm, weight: 991 g, 51 Illustrations, color; 79 Illustrations, black and white; XIX, 634 p. 130 illus., 51 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 13143
  • Izdošanas datums: 09-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303092517X
  • ISBN-13: 9783030925178
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.

The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.

Authenticated Encryption.- Revisiting the Security of COMET
Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.-
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.-
Symmetric Cryptography.- Crooked Indierentiability of Enveloped XOR
Revisited.- Sequential Indierentiability of Confusion-Diusion Networks.-
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.-
Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For
Boyar-Peraltas Algorithm.- Pushing the Limits: Searching for Implementations
with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation
for FSR based Symmetric Ciphers & Related Grovers Attacks.- Side-Channel
Attacks.- Analyzing Masked Ciphers Against Transition and Coupling Eects.- A
Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.-
Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.-
Dierential Fault Attackon Espresso.- Dierential Fault Attack on Montgomery
Ladder and in the Presence of Scalar Randomization.- Fault-Enabled
Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH:
Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious
Encryption from Isogenies with Application to Accountable Tracing
Signatures.- Identity-Based Signature and Extended Forking Algorithm in the
Multivariate Quadratic Setting.- Public Key Encryption and Protocols.-
Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure
Public Key Encryption without Key Update from Proof-of-Stake Blockchain.-
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.-
Cryptographic Constructions.- Exipnos: An Ecient Veriable Dynamic Symmetric
Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth
Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick:
Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.-
On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal
Circuit Assumptions.- Succinct Publicly-Certiable Proofs (or, Can a
Blockchain Verify a Designated-Verier Proof?).