Atjaunināt sīkdatņu piekrišanu

Public-Key Cryptography PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Rųros, Norway, May 1215, 2025, Proceedings, Part II [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 393 pages, height x width: 235x155 mm, 14 Illustrations, color; 49 Illustrations, black and white; XIV, 393 p. 63 illus., 14 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15675
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918223
  • ISBN-13: 9783031918223
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 118,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 139,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 393 pages, height x width: 235x155 mm, 14 Illustrations, color; 49 Illustrations, black and white; XIV, 393 p. 63 illus., 14 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15675
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918223
  • ISBN-13: 9783031918223
Citas grāmatas par šo tēmu:
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Rųros, Norway, during May 1215, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.



 



 
Multi-Signatures: Universally Composable Interactive and Ordered
Multi-Signatures.- Accountable Multi-Signatures with Constant Size Public
Keys.- Privacy-Preserving Multi-Signatures: Generic Techniques and
Constructions Without Pairings.- A Framework for Group Action-Based
Multi-Signatures and Applications to LESS, MEDS, and ALTEQ. Protocols:
Security Analysis of Signals PQXDH Handshake.- Towards Leakage-Resilient
Ratcheted Key Exchange.- Non-Interactive Key Exchange: New Notions, New
Constructions, and Forward Security.- Effcient Verifiable Mixnets from
Lattices, Revisited. Foundations of Lattices and LPN: Vanishing Short Integer
Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for
Low-Degree Polynomials.- Discrete Gaussians Modulo Sub-Lattices: New Leftover
Hash Lemmas for Discrete Gaussians.- Memory-Effcient BKW Algorithm for
Solving the LWE Problem.- Worst and Average Case Hardness of Decoding via
Smoothing Bounds.