LEADER 00902nam0-22002891i-450 001 990007978170403321 005 20250109150446.0 010 $a88-00-81504-9 035 $a000797817 100 $a20041221d2004----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------101cy 200 1 $aCicerone tra antichi e moderni$eatti del IV Symposium Ciceronianum Arpinas, Arpino 9 maggio 2003$fa cura di Emanuele Narducci 210 $aFirenze$cLe Monnier$d2004 215 $aXI, 104 p.$d24 cm 676 $a186.3 676 $a875.01 702 1$aNarducci,$bEmanuele$f<1950-2007> 710 12$aSymposium Ciceronianum Arpinas$d<4. ;$f2003 ;$eArpino>$0496621 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007978170403321 952 $aP2B 650 CIC/S 12$bBibl. 50777$fFLFBC 959 $aFLFBC 996 $aCicerone tra antichi e moderni$9751323 997 $aUNINA LEADER 04331nam 22006735 450 001 9910508454703321 005 20251113201356.0 010 $a3-030-90402-4 024 7 $a10.1007/978-3-030-90402-9 035 $a(CKB)5600000000080728 035 $a(MiAaPQ)EBC6797278 035 $a(Au-PeEL)EBL6797278 035 $a(PPN)258838558 035 $a(OCoLC)1284914862 035 $a(DE-He213)978-3-030-90402-9 035 $a(EXLCZ)995600000000080728 100 $a20211027d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProvable and Practical Security $e15th International Conference, ProvSec 2021, Guangzhou, China, November 5?8, 2021, Proceedings /$fedited by Qiong Huang, Yu Yu 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (397 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v13059 311 08$a3-030-90401-6 327 $aSearchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- . 330 $aThis book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v13059 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aData protection 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aComputer Engineering and Networks 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aData protection. 615 14$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aComputer Engineering and Networks. 615 24$aData and Information Security. 676 $a005.8 702 $aHuang$b Qiong 702 $aYu$b Yu 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910508454703321 996 $aProvable and practical security$92113467 997 $aUNINA