Muutke küpsiste eelistusi

Progress in Cryptology - AFRICACRYPT 2024: 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 1012, 2024, Proceedings 2024 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 455 pages, kõrgus x laius: 235x155 mm, 24 Illustrations, color; 35 Illustrations, black and white; XXI, 455 p. 59 illus., 24 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14861
  • Ilmumisaeg: 11-Jul-2024
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031643801
  • ISBN-13: 9783031643804
  • Pehme köide
  • Hind: 76,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 89,99 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 455 pages, kõrgus x laius: 235x155 mm, 24 Illustrations, color; 35 Illustrations, black and white; XXI, 455 p. 59 illus., 24 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14861
  • Ilmumisaeg: 11-Jul-2024
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031643801
  • ISBN-13: 9783031643804
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, held in Douala, Cameroon, in July 2024.





The 19 full papers included in this book were carefully reviewed and selected from 35 submissions. They are organized in topical sections as follows: symmetric key cryptography; advanced primitives; post-quantum cryptography; elliptic curve cryptography and RSA; lattice-based cryptography constructions; and lattice-based cryptography cryptanalysis.
Symmetric Key Cryptography.- On the Double Differential Uniformity of
Vectorial Boolean Functions.- TooLIP: How to Find New Instances of FiLIP
Cipher With Smaller Key Size and New Filters.- Best Paper
Award.- Quasi-Optimal Permutation Ranking and Applications to PERK.- Advanced
Primitives .- CDLS: Proving Knowledge of Committed Discrete Logarithms with
Soundness.- Cryptographic Accumulators: New Definitions, Enhanced Security,
and Delegatable Proofs.- Efficient Oblivious Transfer for One-Sided Active
Adaptive Adversaries.- Reducing Garbled Circuit Size While Preserving Circuit
Gate Privacy.- iUC-Secure Distributed File Transfer From Standard
Attribute-based Encryption.- Post-quantum Cryptography.- On the
Generalizations of the Rank Metric Over Finite Chain Rings.- Polynomial-Time
Key-Recovery Attack on the NIST Specification of PROV.- QCCA security of
Fujisaki-Okamoto Transformation in the Quantum Random Oracle
Model.- Side-Channel Analysis of Arithmetic Encodings for Post-Quantum
Cryptography: Cautionary Notes with Application to Kyber.- Elliptic Curve
Cryptography and RSA.- Special TNFS-Secure Pairings on Ordinary Genus 2
Hyperelliptic Curves.- Same Values Analysis Attack on Weierstrass Binary
Elliptic Curves.- Cryptanalysis of a New Variant of the RSA Cryptosystem.-
Lattice-based Cryptography Constructions.- DiTRU: A Resurrection of NTRU over
Dihedral Group.- Guidance for Efficient Selection of Secure Parameters for
Fully Homomorphic Encryption.- Lattice-based Cryptography
Cryptanalysis.- Finding Dense Submodules with Algebraic Lattice
Reduction.- The Cool and the Cruel: Separating Hard Parts of LWE Secrets.