LEADER 03928nam 22006975 450 001 9910855389703321 005 20240909111317.0 010 $a9783031588686 010 $a3031588681 024 7 $a10.1007/978-3-031-58868-6 035 $a(MiAaPQ)EBC31322500 035 $a(Au-PeEL)EBL31322500 035 $a(CKB)31973033100041 035 $a(DE-He213)978-3-031-58868-6 035 $a(OCoLC)1433656688 035 $a(EXLCZ)9931973033100041 100 $a20240506d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTopics in Cryptology ? CT-RSA 2024 $eCryptographers? Track at the RSA Conference 2024, San Francisco, CA, USA, May 6?9, 2024, Proceedings /$fedited by Elisabeth Oswald 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (490 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14643 311 08$a9783031588679 311 08$a3031588673 327 $aA Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private -- The Security of the Full EDHOC Protocol in the Multi-user Setting -- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model -- Automated-based Rebound Attacks on ACE Permutation -- Batch Signatures, Revisited -- History-Free Sequential Aggregation of Hash-and-Sign Signatures -- TFHE Public-Key Encryption Revisited -- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption -- The Exact Multi-User Security of 2-Key Triple DES -- Improved Meet-in-the-Middle Attacks on 9-Round AES-192 -- Identity-Based Encryption from LWE with More Compact Master Public Key -- Towards Compact Identity-based Encryption on Ideal Lattices -- Attribute-Based Signatures with Advanced Delegation, and Tracing -- Lattice-based Threshold, Accountable, and Private Signature -- Ascon MAC, PRF, and Short-Input PRF -- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation -- Parameterization of Fault Adversary Models - Connecting Theory and Practice -- Cutting the GRASS: Threshold GRoup Action Signature Schemes. 330 $aThis book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6?9, 2024. The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14643 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer engineering 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aCoding and Information Theory. 676 $a5,824 700 $aOswald$b Elisabeth$01738149 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910855389703321 996 $aTopics in Cryptology - CT-RSA 2024$94160144 997 $aUNINA