書名・著者名等
|
Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III / edited by Tal Malkin, Chris Peikert
|
資料種別
|
リモートファイル
|
版
|
1st ed. 2021
|
出版者・出版年
|
Cham : Springer International Publishing : Imprint: Springer , 2021
|
形状・大きさ
|
XV, 810 p. 133 illus., 68 illus. in color : online resource
|
巻号情報
|
|
シリーズ名等
|
Security and Cryptology <> 12827//a
|
内容著作注記
|
Models
|
内容著作注記
|
A Rational Protocol Treatment of 51% Attacks
|
内容著作注記
|
MoSS: Modular Security Specifications Framework
|
内容著作注記
|
Tight State-Restoration Soundness in the Algebraic Group Model
|
内容著作注記
|
Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model
|
内容著作注記
|
Applied Cryptography and Side Channels
|
内容著作注記
|
Provable Security Analysis of FIDO2-. SSE and SSD: Page-Efficient Searchable Symmetric Encryption
|
内容著作注記
|
Towards Tight Random Probing Security
|
内容著作注記
|
Secure Wire Shuffling in the Probing Model
|
内容著作注記
|
Cryptanalysis
|
内容著作注記
|
Differential-Linear Cryptanalysis from an Algebraic Perspective
|
内容著作注記
|
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
|
内容著作注記
|
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
|
内容著作注記
|
Thinking Outside the Superbox
|
内容著作注記
|
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
|
内容著作注記
|
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
|
内容著作注記
|
Improved torsion-point attacks on SIDH variants
|
内容著作注記
|
Codes and Extractors
|
内容著作注記
|
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
|
内容著作注記
|
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
|
内容著作注記
|
Non-Malleable Codes for Bounded Parallel-Time Tampering
|
内容著作注記
|
Improved Computational Extractors and their Applications
|
内容著作注記
|
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing
|
内容著作注記
|
Secret Sharing
|
内容著作注記
|
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n
|
内容著作注記
|
Asymptotically-Good Arithmetic Secret Sharing over 〓/p〓〓 with Strong Multiplication and Its Applications to Efficient MPC
|
内容著作注記
|
Large Message Homomorphic Secret Sharing from DCR and Applications
|
内容著作注記
|
Traceable Secret Sharing and Applications
|
内容著作注記
|
Quadratic Secret Sharing and Conditional Disclosure of Secrets
|
内容著作注記
|
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes
|
注記
|
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021. The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols
|
NCID
|
9783030842536
|
本文の言語
|
英語
|
著者リンク
|
Malkin, Tal <> editor
|
著者リンク
|
Peikert, Chris <> editor
|
著者リンク
|
SpringerLink (Online service) <>
|
分類
|
DC23:005.824
|
件名
|
Cryptography
|
件名
|
Data encryption (Computer science)
|
件名
|
Computer engineering
|
件名
|
Computer networks
|
件名
|
Data protection
|
件名
|
Coding theory
|
件名
|
Information theory
|
件名
|
Cryptology
|
件名
|
Computer Engineering and Networks
|
件名
|
Computer Engineering and Networks
|
件名
|
Data and Information Security
|
件名
|
Coding and Information Theory
|
電子書籍・雑誌へアクセス
|
https://doi.org/10.1007/978-3-030-84252-9
|