Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
| Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XII, 235 p. 31 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Coding theory Information theory Computer communication systems Software engineering Mathematical statistics Optical data processing Systems and Data Security Coding and Information Theory Computer Communication Networks Software Engineering Probability and Statistics in Computer Science Image Processing and Computer Vision |
| ISBN | 3-319-72089-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges. |
| Record Nr. | UNISA-996466422703316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Theoretic Security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata
| Information Theoretic Security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XII, 235 p. 31 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Coding theory Information theory Computer networks Software engineering Mathematical statistics Optical data processing Systems and Data Security Coding and Information Theory Computer Communication Networks Software Engineering Probability and Statistics in Computer Science Image Processing and Computer Vision |
| ISBN | 3-319-72089-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges. |
| Record Nr. | UNINA-9910484231003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
| Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (655 pages) |
| Disciplina | 005.824 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Software engineering
Application software Public key cryptography |
| ISBN | 3-030-97121-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464544903316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
| Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (538 pages) |
| Disciplina | 005.824 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Application software
Coding theory Public key cryptography |
| ISBN | 3-030-97131-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464542003316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
| Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (538 pages) |
| Disciplina | 005.824 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Coding theory Information theory Computer networks - Security measures Application software Cryptology Computer Communication Networks Coding and Information Theory Mobile and Network Security Computer and Information Systems Applications |
| ISBN | 3-030-97131-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Key Exchange -- Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake -- Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles -- Theory -- Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption -- Financially Backed Covert Security -- Lifting Standard Model Reductions to Common Setup Assumptions -- Encryption -- Efficient Lattice-Based Inner-Product Functional Encryption -- The Direction of Updatable Encryption Does Matter -- Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices -- Encapsulated Search Index : Public-Key, Sub-linear, Distributed, and Delegatable -- KDM Security for the Fujisaki-Okamoto Transformations in the QROM -- A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels -- Signatures -- Lattice-based Signatures with Tight Adaptive Corruptions and More -- Count Me In! Extendablity for Threshold Ring Signatures -- A Note on the Post-Quantum Security of (Ring) Signatures -- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model -- On Pairing-Free Blind Signature Schemes in the Algebraic Group Model -- Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures. |
| Record Nr. | UNINA-9910548172603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
| Public-Key Cryptography – PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I / / edited by Goichiro Hanaoka, Junji Shikata, Yohei Watanabe |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (655 pages) |
| Disciplina | 005.824 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer engineering Computer networks Computer networks - Security measures Application software Software engineering Cryptology Computer Engineering and Networks Mobile and Network Security Computer and Information Systems Applications Software Engineering |
| ISBN | 3-030-97121-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptanalysis -- Multitarget decryption failure attacks and their application to Saber and Kyber -- Post-quantum Security of Plain OAEP Transform -- On the security of OSIDH -- Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes -- Syndrome Decoding Estimator -- On the Isogeny Problem with Torsion Point Information -- MPC and Secret Sharing -- Reusable Two-Round MPC from LPN -- On the Bottleneck Complexity of MPC with Correlated Randomness -- Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN -- Fast Batched DPSS and its Applications -- CNF-FSS and its Applications -- Cryptographic Protocols -- Effcient Verifiable Partially-Decryptable Commitments from Lattices and Applications -- Making Private Function Evaluation Safer, Faster, and Simpler -- Two-Round Oblivious Linear Evaluation from Learning with Errors -- Improved Constructions of Anonymous Credentials From StructurePreserving Signatures on Equivalence Classes -- Traceable PRFs: Full Collusion Resistance andActive Security -- Tools -- Radical Isogenies on Montgomery Curves -- Towards a Simpler Lattice Gadget Toolkit -- SNARKs and NIZKs -- Polynomial IOPs for Linear Algebra Relations -- A Unified Framework for Non-Universal SNARKs -- ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines -- Rational Modular Encoding in the DCR Setting: Non-Interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. . |
| Record Nr. | UNINA-9910548176203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||