Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XV, 904 p. 153 illus., 31 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security Blockchains (Databases) |
ISBN | 3-030-64840-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly|An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. |
Record Nr. | UNINA-9910447252203321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XXVII, 914 p. 123 illus.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-64837-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to Build Optimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking. |
Record Nr. | UNINA-9910447250903321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XV, 818 p. 141 illus., 34 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-64834-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. |
Record Nr. | UNINA-9910447252303321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XXVII, 914 p. 123 illus.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-64837-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to Build Optimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking. |
Record Nr. | UNISA-996418212203316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XV, 818 p. 141 illus., 34 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-64834-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. |
Record Nr. | UNISA-996418214903316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XV, 904 p. 153 illus., 31 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security Blockchains (Databases) |
ISBN | 3-030-64840-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly|An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. |
Record Nr. | UNISA-996418215103316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (715 pages) |
Disciplina | 001.5436 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-030-92062-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910512310103321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (713 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptography |
ISBN | 3-030-92078-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910512309903321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (784 pages) |
Disciplina | 001.5436 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-030-92068-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510579703321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (713 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptography |
ISBN | 3-030-92078-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464495803316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|