Cantitate/Preț
Produs

Topics in Cryptology – CT-RSA 2024: Cryptographers’ Track at the RSA Conference 2024, San Francisco, CA, USA, May 6–9, 2024, Proceedings: Lecture Notes in Computer Science, cartea 14643

Editat de Elisabeth Oswald
en Limba Engleză Paperback – 6 mai 2024
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6–9, 2024.
The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 43859 lei

Preț vechi: 51598 lei
-15% Nou

Puncte Express: 658

Preț estimativ în valută:
8392 8786$ 6944£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031588679
ISBN-10: 3031588673
Ilustrații: X, 491 p. 61 illus., 18 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private.- The Security of the Full EDHOC Protocol in the Multi-user Setting.- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model.- Automated-based Rebound Attacks on ACE Permutation.- Batch Signatures, Revisited.- History-Free Sequential Aggregation of Hash-and-Sign Signatures.- TFHE Public-Key Encryption Revisited.- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption.- The Exact Multi-User Security of 2-Key Triple DES.- Improved Meet-in-the-Middle Attacks on 9-Round AES-192.- Identity-Based Encryption from LWE with More Compact Master Public Key.- Towards Compact Identity-based Encryption on Ideal Lattices.- Attribute-Based Signatures with Advanced Delegation, and Tracing.- Lattice-based Threshold, Accountable, and Private Signature.- Ascon MAC, PRF, and Short-Input PRF.- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation.- Parameterization of Fault Adversary Models - Connecting Theory and Practice.- Cutting the GRASS: Threshold GRoup Action Signature Schemes.