Atjaunināt sīkdatņu piekrišanu

E-grāmata: Progress in Cryptology - INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Security and Cryptology 13143
  • Izdošanas datums: 08-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030925185
  • Formāts - EPUB+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Security and Cryptology 13143
  • Izdošanas datums: 08-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030925185

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.

The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.

Authenticated Encryption.- Revisiting the Security of COMET
Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.-
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.-
Symmetric Cryptography.- Crooked Indierentiability of Enveloped XOR
Revisited.- Sequential Indierentiability of Confusion-Diusion Networks.-
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.-
Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For
Boyar-Peraltas Algorithm.- Pushing the Limits: Searching for Implementations
with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation
for FSR based Symmetric Ciphers & Related Grovers Attacks.- Side-Channel
Attacks.- Analyzing Masked Ciphers Against Transition and Coupling Eects.- A
Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.-
Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.-
Dierential Fault Attackon Espresso.- Dierential Fault Attack on Montgomery
Ladder and in the Presence of Scalar Randomization.- Fault-Enabled
Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH:
Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious
Encryption from Isogenies with Application to Accountable Tracing
Signatures.- Identity-Based Signature and Extended Forking Algorithm in the
Multivariate Quadratic Setting.- Public Key Encryption and Protocols.-
Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure
Public Key Encryption without Key Update from Proof-of-Stake Blockchain.-
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.-
Cryptographic Constructions.- Exipnos: An Ecient Veriable Dynamic Symmetric
Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth
Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick:
Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.-
On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal
Circuit Assumptions.- Succinct Publicly-Certiable Proofs (or, Can a
Blockchain Verify a Designated-Verier Proof?).