Advances in Cryptology - ASIACRYPT 2021: Lecture Notes in Computer Science
Editat de Mehdi Tibouchi, Huaxiong Wangen Limba Engleză Paperback – 2 dec 2021
The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security;
Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols;
Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search;
Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (4) | 643.58 lei 6-8 săpt. | |
| Springer – 2 dec 2021 | 643.58 lei 6-8 săpt. | |
| Springer – 2 dec 2021 | 698.09 lei 6-8 săpt. | |
| Springer – 2 dec 2021 | 701.76 lei 6-8 săpt. | |
| Springer – 2 dec 2021 | 754.19 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 754.19 lei
Preț vechi: 942.73 lei
-20% Nou
Puncte Express: 1131
Preț estimativ în valută:
133.46€ • 156.49$ • 117.20£
133.46€ • 156.49$ • 117.20£
Carte tipărită la comandă
Livrare economică 12-26 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030920746
ISBN-10: 3030920747
Pagini: 748
Ilustrații: XVII, 728 p. 123 illus., 39 illus. in color.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.11 kg
Ediția:1st edition 2021
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030920747
Pagini: 748
Ilustrații: XVII, 728 p. 123 illus., 39 illus. in color.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.11 kg
Ediția:1st edition 2021
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Secure and Efficient Software Masking on Superscalar Pipelined Processors.- Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Cand.- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.- Efficient Leakage-Resilient MACs without Idealized Assumptions.- DEFAULT: Cipher Level Resistance Against Differential Fault Attack.- Random Probing Expansion: Quasi Linear Gadgets \& Dynamic Compilers.- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials.- Improved single-round secure multiplication using regenerating codes.- Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation.- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.- Reverse Firewalls for Adaptively Secure MPC without Setup.- On Time-LockCryptographic Assumptions in Abelian Hidden-Order Groups.- Astrolabous: A Universally Composable Time Lock Encryption Scheme.- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.- Simulation-Based Bi-Selective Opening Security for Public Key Encryption.- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness.- Hierarchical Integrated Signature and Encryption.- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions.- Onion Routing with Replies.- Private Join and Compute from PIR with Default.- Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy.- Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.