Muutke küpsiste eelistusi

E-raamat: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 12804
  • Ilmumisaeg: 20-Jul-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030816520
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 12804
  • Ilmumisaeg: 20-Jul-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030816520

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020.





The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions
Public-key Cryptography.- Efficient Lattice-Based Polynomial Evaluation
and Batch ZK Arguments.- FROST: Flexible Round-Optimized Schnorr Threshold
Signatures.- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic
Encryption for Compute-Enabled RAM.- Obfuscating Finite Automata.- On Index
Calculus Algorithms for Subfield Curves.- Symmetric-Key Analysis Weak-Key
Distinguishers for AES.- Algebraic Key-Recovery Attacks on Reduced-Round
Xoofff.- Improved (Related-key) Differential Cryptanalysis on GIFT.- Boolean
Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath.-
Boolean Ring Cryptographic Equation Solving.- Interpolation Cryptanalysis of
Unbalanced Feistel Networks with Low Degree Round Functions.- Unintended
Features of APIs: Cryptanalysis of Incremental HMAC.- Quantum Cryptanalysis.-
 Low-gate Quantum Golden Collision Finding.- Improvements to quantum search
techniques for block-ciphers, with applications to AES.-  Post-Quantum
Constructions.- Not enough LESS: An improved algorithm for solving Code
Equivalence Problems over Fq.- Towards Post-Quantum Security for Signals
X3DH Handshake.- Trapdoor DDH groups from pairings and isogenies.- Practical
Isogeny-Based Key-exchange with Optimal Tightness.- Symmetric-Key Design.-
PRINCEv2.- Nonce-Misuse Security of the SAEF Authenticated Encryption mode.-
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.- Side Channel
Attacks.- Subsampling and Knowledge Distillation on Adversarial Examples: New
Techniques for Deep Learning Based Side Channel Evaluations.- Correlation
Power Analysis and Higher-order Masking Implementation of WAGE.- On the
Influence of Optimizers in Deep Learning-based Side-channel Analysis.-
Cryptographic Applications.- On Self-Equivalence Encodings in White-Box
Implementations.- Protecting the Privacy of Voters: New Definitions of Ballot
Secrecy for E-Voting.- High-Throughput Elliptic Curve Cryptography Using AVX2
Vector Instructions.-