Atjaunināt sīkdatņu piekrišanu

Public-Key Cryptography PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Rųros, Norway, May 1215, 2025, Proceedings, Part I [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 488 pages, height x width: 235x155 mm, 31 Illustrations, color; 37 Illustrations, black and white; XIV, 488 p. 68 illus., 31 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15674
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918193
  • ISBN-13: 9783031918193
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 68,33 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 80,39 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 488 pages, height x width: 235x155 mm, 31 Illustrations, color; 37 Illustrations, black and white; XIV, 488 p. 68 illus., 31 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15674
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918193
  • ISBN-13: 9783031918193
Citas grāmatas par šo tēmu:
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Rųros, Norway, during May 1215, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.



 
MPC and Friends: Non-Interactive Distributed Point Functions.-
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of
Exponentiation.- Higher Residuosity Attacks on Small RSA Subgroup Decision
Problems. Advanced PKE: Adaptively Secure IBE from Lattices with
Asymptotically Better Effciency.- Adaptively-Secure Big-Key Identity-Based
Encryption.- Non-Committing Identity based Encryption: Constructions and
Applications.- Registration-Based Encryption in the Plain Model. Security of
Post-Quantum Signatures: Thorough Power Analysis on Falcon Gaussian Samplers
and Practical Countermeasure.- Finding a polytope: A practical fault attack
against Dilithium.- One Bit to Rule Them All - Imperfect Randomness Harms
Lattice Signatures.- The Security of Hash-and-Sign with Retry against
Superposition Attacks. Proofs and Arguments: Split Prover Zero-Knowledge
SNARKs.- Universally Composable Non-Interactive Zero-Knowledge from Sigma
Protocols via a New Straight-line Compiler.- Transparent SNARKs over Galois
Rings.- Lattice-based Proof-Friendly Signatures from Vanishing Short Integer
Solutions.