Cantitate/Preț
Produs

Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings: Lecture Notes in Computer Science, cartea 12912

Editat de Patrick Longa, Carla Ràfols
en Limba Engleză Paperback – 30 sep 2021
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. 

The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 53681 lei

Preț vechi: 63154 lei
-15% Nou

Puncte Express: 805

Preț estimativ în valută:
10274 10697$ 8682£

Carte tipărită la comandă

Livrare economică 10-24 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030882372
ISBN-10: 3030882373
Pagini: 473
Ilustrații: XI, 473 p. 87 illus., 42 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Quantum Cryptography.- Tight Bounds for Simon's Algorithm.- Constructions for Quantum Indistinguishability Obfuscation.- On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer.- Post-Quantum Cryptography.- Post-Quantum Key-Blinding for Authentication in Anonymity Networks.- Implementing and measuring KEMTLS.- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates.- Attribute-Based Access Control for Inner Product Functional Encryption from LWE.- Asymmetric Cryptanalysis.- Classical Attacks on a Variant of the RSA Cryptosystem.- Improved attacks against key reuse in learning with errors key exchange.- Cryptanalysis and Side-Channel Analysis.- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.- Train or Adapt a Deeply Learned Profile.- Autocorrelations of vectorial Boolean functions.- Automatic Search for Bit-based Division Property.- TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.- Distributed Cryptographic Protocols.- Weight-Based Nakamoto-Style Blockchains.- LOVE a Pairing.- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo.- Stronger Notions and a More E cient Construction of Threshold Ring Signatures.- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.- Multiparty Computation.- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling.- The Cost of IEEE Arithmetic in Secure Computation.- Honest Majority MPC with Abort with Minimal Online Communication.