000 | 05484nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-92068-5 | ||
003 | DE-He213 | ||
005 | 20240730180923.0 | ||
007 | cr nn 008mamaa | ||
008 | 211130s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030920685 _9978-3-030-92068-5 |
||
024 | 7 |
_a10.1007/978-3-030-92068-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - ASIACRYPT 2021 _h[electronic resource] : _b27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV / _cedited by Mehdi Tibouchi, Huaxiong Wang. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXVII, 774 p. 123 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13093 |
|
505 | 0 | _aNTRU Fatigue: How Stretched is Overstretched? -- Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS -- Lattice sieving via quantum random walks -- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs -- Gladius: LWR based efficient hybrid public key encryption with distributed decryption -- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy -- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV -- Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations -- SĂ©ta: Supersingular Encryption from Torsion Attacks -- SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH -- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups -- Public Key Encryption with Flexible Pattern Matching -- Bounded Collusion ABE for TMs from IBE -- Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting -- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin -- Boosting the Security of Blind Signature Schemes -- PrORAM: Fast O(log n) Authenticated Shares ZK ORAM -- Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures -- Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups -- The One-More Discrete Logarithm Assumption in the Generic Group Model -- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge -- Chain Reductions for Multi-Signatures and the HBMS Scheme -- Symmetric Key Exchange with Full Forward Security and Robust Synchronization -- Security Analysis of CPace -- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. | |
520 | _aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9122519 |
650 | 2 | 4 |
_aCoding and Information Theory. _9122520 |
650 | 2 | 4 |
_aComputer Communication Networks. _9122521 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aTibouchi, Mehdi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9122522 |
|
700 | 1 |
_aWang, Huaxiong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9122523 |
|
710 | 2 |
_aSpringerLink (Online service) _9122524 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030920678 |
776 | 0 | 8 |
_iPrinted edition: _z9783030920692 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13093 _9122525 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-92068-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90586 _d90586 |