Muutke küpsiste eelistusi

E-raamat: Progress in Cryptology - INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings

Edited by , Edited by , Edited by
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 13143
  • Ilmumisaeg: 08-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030925185
  • Formaat - EPUB+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 13143
  • Ilmumisaeg: 08-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030925185

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.

The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.

Authenticated Encryption.- Revisiting the Security of COMET
Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.-
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.-
Symmetric Cryptography.- Crooked Indierentiability of Enveloped XOR
Revisited.- Sequential Indierentiability of Confusion-Diusion Networks.-
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.-
Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For
Boyar-Peraltas Algorithm.- Pushing the Limits: Searching for Implementations
with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation
for FSR based Symmetric Ciphers & Related Grovers Attacks.- Side-Channel
Attacks.- Analyzing Masked Ciphers Against Transition and Coupling Eects.- A
Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.-
Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.-
Dierential Fault Attackon Espresso.- Dierential Fault Attack on Montgomery
Ladder and in the Presence of Scalar Randomization.- Fault-Enabled
Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH:
Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious
Encryption from Isogenies with Application to Accountable Tracing
Signatures.- Identity-Based Signature and Extended Forking Algorithm in the
Multivariate Quadratic Setting.- Public Key Encryption and Protocols.-
Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure
Public Key Encryption without Key Update from Proof-of-Stake Blockchain.-
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.-
Cryptographic Constructions.- Exipnos: An Ecient Veriable Dynamic Symmetric
Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth
Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick:
Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.-
On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal
Circuit Assumptions.- Succinct Publicly-Certiable Proofs (or, Can a
Blockchain Verify a Designated-Verier Proof?).