Muutke küpsiste eelistusi

Progress in Cryptology INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 1215, 2021, Proceedings 1st ed. 2021 [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 634 pages, kõrgus x laius: 235x155 mm, kaal: 991 g, 51 Illustrations, color; 79 Illustrations, black and white; XIX, 634 p. 130 illus., 51 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 13143
  • Ilmumisaeg: 09-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303092517X
  • ISBN-13: 9783030925178
  • Pehme köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 634 pages, kõrgus x laius: 235x155 mm, kaal: 991 g, 51 Illustrations, color; 79 Illustrations, black and white; XIX, 634 p. 130 illus., 51 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 13143
  • Ilmumisaeg: 09-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303092517X
  • ISBN-13: 9783030925178
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.

The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.

Authenticated Encryption.- Revisiting the Security of COMET
Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.-
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.-
Symmetric Cryptography.- Crooked Indierentiability of Enveloped XOR
Revisited.- Sequential Indierentiability of Confusion-Diusion Networks.-
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.-
Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For
Boyar-Peraltas Algorithm.- Pushing the Limits: Searching for Implementations
with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation
for FSR based Symmetric Ciphers & Related Grovers Attacks.- Side-Channel
Attacks.- Analyzing Masked Ciphers Against Transition and Coupling Eects.- A
Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.-
Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.-
Dierential Fault Attackon Espresso.- Dierential Fault Attack on Montgomery
Ladder and in the Presence of Scalar Randomization.- Fault-Enabled
Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH:
Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious
Encryption from Isogenies with Application to Accountable Tracing
Signatures.- Identity-Based Signature and Extended Forking Algorithm in the
Multivariate Quadratic Setting.- Public Key Encryption and Protocols.-
Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure
Public Key Encryption without Key Update from Proof-of-Stake Blockchain.-
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.-
Cryptographic Constructions.- Exipnos: An Ecient Veriable Dynamic Symmetric
Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth
Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick:
Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.-
On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal
Circuit Assumptions.- Succinct Publicly-Certiable Proofs (or, Can a
Blockchain Verify a Designated-Verier Proof?).