Atjaunināt sīkdatņu piekrišanu

E-grāmata: Public-Key Cryptography - PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I

Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12710
  • Izdošanas datums: 30-Apr-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030752453
  • Formāts - PDF+DRM
  • Cena: 142,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12710
  • Izdošanas datums: 30-Apr-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030752453

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.

The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Post-Quantum Constructions and Cryptanalysis.- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model.- An Alternative Approach for SIDH Arithmetic.- The Convergence of Slide-type Reductions.- On the Success Probability of Solving Unique SVP via BKZ.- Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.- Isogeny-based key compression without pairings.- Analysis of Multivariate Encryption Schemes: Application to Dob.- On the Integer Polynomial Learning with Errors Problem.- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.- Multivariate Public Key Cryptosystem from Sidon Spaces.- Banquet: Short and Fast Signatures from AES.- Cryptographic Primitives and Schemes.- Improving Revocation for Group Signature with Redactable Signature.- Bootstrapping fully homomorphic encryption over the integers in less than one second.- Group Signatures with User-Controlled and Sequential Linkability.- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.- Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks.- Two-Party Adaptor Signatures From Identification Schemes.- Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.- Universal Proxy Re-Encryption.- Master-Key KDM-Secure ABE via Predicate Encoding.- Exact Lattice Sampling from Non-Gaussian Distributions.- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.- Subversion-Resilient Public Key Encryption with Practical Watchdogs.- Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.- Updatable Signatures and Message Authentication Codes.- Multi-Client Functional Encryption for Separable Functions.