top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 235 p. 31 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Coding theory
Information theory
Computer communication systems
Software engineering
Mathematical statistics
Optical data processing
Systems and Data Security
Coding and Information Theory
Computer Communication Networks
Software Engineering
Probability and Statistics in Computer Science
Image Processing and Computer Vision
ISBN 3-319-72089-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.
Record Nr. UNISA-996466422703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Theoretic Security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
Information Theoretic Security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 235 p. 31 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Coding theory
Information theory
Computer networks
Software engineering
Mathematical statistics
Optical data processing
Systems and Data Security
Coding and Information Theory
Computer Communication Networks
Software Engineering
Probability and Statistics in Computer Science
Image Processing and Computer Vision
ISBN 3-319-72089-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.
Record Nr. UNINA-9910484231003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (655 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Application software
Public key cryptography
ISBN 3-030-97121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464544903316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (538 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Application software
Coding theory
Public key cryptography
ISBN 3-030-97131-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464542003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (538 pages)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Coding theory
Information theory
Computer networks - Security measures
Application software
Cryptology
Computer Communication Networks
Coding and Information Theory
Mobile and Network Security
Computer and Information Systems Applications
ISBN 3-030-97131-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Exchange -- Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake -- Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles -- Theory -- Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption -- Financially Backed Covert Security -- Lifting Standard Model Reductions to Common Setup Assumptions -- Encryption -- Efficient Lattice-Based Inner-Product Functional Encryption -- The Direction of Updatable Encryption Does Matter -- Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices -- Encapsulated Search Index : Public-Key, Sub-linear, Distributed, and Delegatable -- KDM Security for the Fujisaki-Okamoto Transformations in the QROM -- A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels -- Signatures -- Lattice-based Signatures with Tight Adaptive Corruptions and More -- Count Me In! Extendablity for Threshold Ring Signatures -- A Note on the Post-Quantum Security of (Ring) Signatures -- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model -- On Pairing-Free Blind Signature Schemes in the Algebraic Group Model -- Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.
Record Nr. UNINA-9910548172603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (655 pages)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Computer networks - Security measures
Application software
Software engineering
Cryptology
Computer Engineering and Networks
Mobile and Network Security
Computer and Information Systems Applications
Software Engineering
ISBN 3-030-97121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Multitarget decryption failure attacks and their application to Saber and Kyber -- Post-quantum Security of Plain OAEP Transform -- On the security of OSIDH -- Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes -- Syndrome Decoding Estimator -- On the Isogeny Problem with Torsion Point Information -- MPC and Secret Sharing -- Reusable Two-Round MPC from LPN -- On the Bottleneck Complexity of MPC with Correlated Randomness -- Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN -- Fast Batched DPSS and its Applications -- CNF-FSS and its Applications -- Cryptographic Protocols -- Effcient Verifiable Partially-Decryptable Commitments from Lattices and Applications -- Making Private Function Evaluation Safer, Faster, and Simpler -- Two-Round Oblivious Linear Evaluation from Learning with Errors -- Improved Constructions of Anonymous Credentials From StructurePreserving Signatures on Equivalence Classes -- Traceable PRFs: Full Collusion Resistance andActive Security -- Tools -- Radical Isogenies on Montgomery Curves -- Towards a Simpler Lattice Gadget Toolkit -- SNARKs and NIZKs -- Polynomial IOPs for Linear Algebra Relations -- A Unified Framework for Non-Universal SNARKs -- ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines -- Rational Modular Encoding in the DCR Setting: Non-Interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. .
Record Nr. UNINA-9910548176203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui