Atjaunināt sīkdatņu piekrišanu

E-grāmata: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12804
  • Izdošanas datums: 20-Jul-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030816520
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 12804
  • Izdošanas datums: 20-Jul-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030816520

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020.





The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions
Public-key Cryptography.- Efficient Lattice-Based Polynomial Evaluation
and Batch ZK Arguments.- FROST: Flexible Round-Optimized Schnorr Threshold
Signatures.- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic
Encryption for Compute-Enabled RAM.- Obfuscating Finite Automata.- On Index
Calculus Algorithms for Subfield Curves.- Symmetric-Key Analysis Weak-Key
Distinguishers for AES.- Algebraic Key-Recovery Attacks on Reduced-Round
Xoofff.- Improved (Related-key) Differential Cryptanalysis on GIFT.- Boolean
Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath.-
Boolean Ring Cryptographic Equation Solving.- Interpolation Cryptanalysis of
Unbalanced Feistel Networks with Low Degree Round Functions.- Unintended
Features of APIs: Cryptanalysis of Incremental HMAC.- Quantum Cryptanalysis.-
 Low-gate Quantum Golden Collision Finding.- Improvements to quantum search
techniques for block-ciphers, with applications to AES.-  Post-Quantum
Constructions.- Not enough LESS: An improved algorithm for solving Code
Equivalence Problems over Fq.- Towards Post-Quantum Security for Signals
X3DH Handshake.- Trapdoor DDH groups from pairings and isogenies.- Practical
Isogeny-Based Key-exchange with Optimal Tightness.- Symmetric-Key Design.-
PRINCEv2.- Nonce-Misuse Security of the SAEF Authenticated Encryption mode.-
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.- Side Channel
Attacks.- Subsampling and Knowledge Distillation on Adversarial Examples: New
Techniques for Deep Learning Based Side Channel Evaluations.- Correlation
Power Analysis and Higher-order Masking Implementation of WAGE.- On the
Influence of Optimizers in Deep Learning-based Side-channel Analysis.-
Cryptographic Applications.- On Self-Equivalence Encodings in White-Box
Implementations.- Protecting the Privacy of Voters: New Definitions of Ballot
Secrecy for E-Voting.- High-Throughput Elliptic Curve Cryptography Using AVX2
Vector Instructions.-