Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 698 p. 152 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-28166-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness. |
Record Nr. | UNISA-996466370003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 698 p. 152 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-28166-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness. |
Record Nr. | UNINA-9910483660403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann |
Autore | Deng Jing |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (593 pages) |
Disciplina | 005.824 |
Altri autori (Persone) |
KolesnikovVladimir
SchwarzmannAlexander A |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Data protection Application software Cryptology Computer Communication Networks Mobile and Network Security Data and Information Security Computer and Information Systems Applications |
ISBN | 981-9975-63-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. |
Record Nr. | UNISA-996558464003316 |
Deng Jing | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann |
Autore | Deng Jing |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (593 pages) |
Disciplina | 005.824 |
Altri autori (Persone) |
KolesnikovVladimir
SchwarzmannAlexander A |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Data protection Application software Cryptology Computer Communication Networks Mobile and Network Security Data and Information Security Computer and Information Systems Applications |
ISBN | 981-9975-63-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. |
Record Nr. | UNINA-9910755086603321 |
Deng Jing | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers Architecture, Computer Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNISA-996418285703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (265 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer networks Data encryption (Computer science) Computers Computer architecture Computer networks - Security measures Systems and Data Security Computer Communication Networks Cryptology Information Systems and Communication Service Computer System Implementation Mobile and Network Security |
ISBN | 3-030-49785-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption. |
Record Nr. | UNINA-9910409661403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (707 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Public key cryptography |
ISBN |
9783031313714
9783031313707 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK. |
Record Nr. | UNISA-996534467603316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : International Association for Cryptologic Research, , [2023] |
Descrizione fisica | 1 online resource (812 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Public key cryptography |
ISBN |
9783031313684
9783031313677 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK. |
Record Nr. | UNISA-996534467403316 |
Cham, Switzerland : , : International Association for Cryptologic Research, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (707 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Public key cryptography |
ISBN |
9783031313714
9783031313707 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK. |
Record Nr. | UNINA-9910720074103321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : International Association for Cryptologic Research, , [2023] |
Descrizione fisica | 1 online resource (812 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Public key cryptography |
ISBN |
9783031313684
9783031313677 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK. |
Record Nr. | UNINA-9910720065103321 |
Cham, Switzerland : , : International Association for Cryptologic Research, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|