Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II: Lecture Notes in Computer Science, cartea 12492

Editat de Shiho Moriai, Huaxiong Wang
en Limba Engleză Paperback – 5 dec 2020
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.
Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.
Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 64764 lei  6-8 săpt.
  Springer International Publishing – 5 dec 2020 64764 lei  6-8 săpt.
  Springer International Publishing – 5 dec 2020 65179 lei  6-8 săpt.
  Springer International Publishing – 6 dec 2020 65272 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 64764 lei

Preț vechi: 76193 lei
-15% Nou

Puncte Express: 971

Preț estimativ în valută:
12394 12997$ 10335£

Carte tipărită la comandă

Livrare economică 07-21 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030648336
ISBN-10: 3030648338
Pagini: 818
Ilustrații: XV, 818 p. 141 illus., 34 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.15 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Public Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.- Unbounded HIBE with Tight Security.- Multi-Client Oblivious RAM with Poly-Logarithmic Communication.- Privacy-Preserving Pattern Matching on Encrypted Data.- Efficient Homomorphic Comparison Methods with Optimal Complexity.- Lattice-Based Cryptography.- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings.- Towards Classical Hardness of Module-LWE: The Linear Rank Case.- Lattice-Based E-Cash, Revisited.- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers.- Isogeny-Based Cryptography.- Cryptographic Group Actions and Applications.- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion.- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.- Radical Isogenies.- Oblivious Pseudorandom Functions from Isogenies.- SiGamal: A supersingular isogeny-based PKE and its application to a PRF.- Quantum Algorithms.- Estimating quantum speedups for lattice sieves.- A Combinatorial Approach to Quantum Random Functions.- Improved Classical and Quantum Algorithms for Subset-Sum.- Security Limitations of Classical-Client Delegated Quantum Computing.- Quantum Circuit Implementations of AES with Fewer Qubits.- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.- Authenticated Key Exchange.- Fuzzy Asymmetric Password-Authenticated Key Exchange.- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.