Atjaunināt sīkdatņu piekrišanu

Public-Key Cryptography PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Rųros, Norway, May 1215, 2025, Proceedings, Part III [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 390 pages, height x width: 235x155 mm, 10 Illustrations, color; 43 Illustrations, black and white; XIV, 390 p. 53 illus., 10 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15676
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918258
  • ISBN-13: 9783031918254
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 118,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 139,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 390 pages, height x width: 235x155 mm, 10 Illustrations, color; 43 Illustrations, black and white; XIV, 390 p. 53 illus., 10 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15676
  • Izdošanas datums: 08-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031918258
  • ISBN-13: 9783031918254
Citas grāmatas par šo tēmu:
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Rųros, Norway, during May 1215, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
Advanced PKE: Tight Adaptive Simulation Security for Identity-based
Inner-Product FE in the (Quantum) Random Oracle Model.- Predicate Encryption
from Lattices: Enhanced Compactness and Refined Functionality.- Multi-Client
Functional Encryption with Public Inputs and Strong Security.- Key Revocation
in Registered Attribute-Based Encryption. Threshold Signatures: BUFFing
Threshold Signature Schemes.- Finally! A Compact Lattice-Based Threshold
Signature.- Commit-and-Prove System for Vectors and Applications to Threshold
Signing.- Dazzle: Improved Adaptive Threshold Signatures from DDH. Isogenies
and Group Actions: Radical 2-isogenies and cryptographic hash functions in
dimensions 1, 2 and 3.- PRISM: Simple And Compact Identification and
Signatures From Large Prime Degree Isogenies.- Faster SCALLOP from Non-Prime
Conductor Suborders in Medium Sized Quadratic Fields.- Multiple Group Action
Dlogs with(out) Precomputation.