Progress in Cryptology - INDOCRYPT 2023
Editat de Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiroen Limba Engleză Paperback – 29 mar 2024
The 26 full papers were carefully reviewed and selected from 74 submissions. They are organized in topical sections as follows:
Part One: Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes; Elliptic curves, Zero-knowledge proof, Signatures; Attacks.
Part Two: Secure computation, Algorithm hardness, Privacy; Post-quantum cryptography.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 402.62 lei 6-8 săpt. | |
| Springer – 29 mar 2024 | 402.62 lei 6-8 săpt. | |
| Springer – 29 mar 2024 | 489.11 lei 6-8 săpt. |
Preț: 489.11 lei
Preț vechi: 611.39 lei
-20% Nou
Puncte Express: 734
Preț estimativ în valută:
86.54€ • 100.82$ • 75.57£
86.54€ • 100.82$ • 75.57£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031562310
ISBN-10: 3031562313
Pagini: 376
Ilustrații: XXII, 352 p. 65 illus., 30 illus. in color.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.57 kg
Ediția:2024
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3031562313
Pagini: 376
Ilustrații: XXII, 352 p. 65 illus., 30 illus. in color.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.57 kg
Ediția:2024
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes.- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication
and cyclic shift.- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size.- From Substitution Box To Threshold.- Tight Security Bound of 2k-LightMAC Plus.- Designing Full-Rate Sponge based AEAD Modes.- Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Net- works.- The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm.- Elliptic curves, Zero-knowledge proof, Signatures.- Generating Supersingular Elliptic Curves over Fp with Unknown Endmorphism Ring.- Kummer and Hessian meet in the Field of Characteristic 2.- Synchronized Aggregate Signature under Standard Assumption in the Random Oracle Model.- Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies.- Attacks.- A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics.- Falling into Bytes and Pieces – Cryptanalysis of an Apple Patent Application.- Grover on chosen IV related key attack against GRAIN-128a.- Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm.- Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2.