000 05590nam a22006495i 4500
001 978-3-030-92075-3
003 DE-He213
005 20240730180924.0
007 cr nn 008mamaa
008 211130s2021 sz | s |||| 0|eng d
020 _a9783030920753
_9978-3-030-92075-3
024 7 _a10.1007/978-3-030-92075-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aAdvances in Cryptology - ASIACRYPT 2021
_h[electronic resource] :
_b27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II /
_cedited by Mehdi Tibouchi, Huaxiong Wang.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXVII, 728 p. 123 illus., 39 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v13091
505 0 _aSecure and Efficient Software Masking on Superscalar Pipelined Processors -- Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Cand -- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks -- Efficient Leakage-Resilient MACs without Idealized Assumptions -- DEFAULT: Cipher Level Resistance Against Differential Fault Attack -- Random Probing Expansion: Quasi Linear Gadgets \& Dynamic Compilers -- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials -- Improved single-round secure multiplication using regenerating codes -- Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation -- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation -- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH -- Reverse Firewalls for Adaptively Secure MPC without Setup -- On Time-LockCryptographic Assumptions in Abelian Hidden-Order Groups -- Astrolabous: A Universally Composable Time Lock Encryption Scheme -- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE -- Simulation-Based Bi-Selective Opening Security for Public Key Encryption -- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness -- Hierarchical Integrated Signature and Encryption -- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions -- Onion Routing with Replies -- Private Join and Compute from PIR with Default -- Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures -- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy -- Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
520 _aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aApplication software.
_9122526
650 0 _aSoftware engineering.
_94138
650 0 _aComputer networks .
_931572
650 1 4 _aCryptology.
_931769
650 2 4 _aCoding and Information Theory.
_9122527
650 2 4 _aComputer and Information Systems Applications.
_9122528
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer Communication Networks.
_9122529
700 1 _aTibouchi, Mehdi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122530
700 1 _aWang, Huaxiong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122531
710 2 _aSpringerLink (Online service)
_9122532
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030920746
776 0 8 _iPrinted edition:
_z9783030920760
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v13091
_9122533
856 4 0 _uhttps://doi.org/10.1007/978-3-030-92075-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90587
_d90587