Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Topics in cryptology - CT-RSA 2019th...
~
(1998 :)
Topics in cryptology - CT-RSA 2019the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Topics in cryptology - CT-RSA 2019edited by Mitsuru Matsui.
Reminder of title:
the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /
remainder title:
CT-RSA 2019
other author:
Matsui, Mitsuru.
corporate name:
Published:
Cham :Springer International Publishing :2019.
Description:
xi, 578 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-3-030-12612-4
ISBN:
9783030126124$q(electronic bk.)
Topics in cryptology - CT-RSA 2019the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /
Topics in cryptology - CT-RSA 2019
the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /[electronic resource] :CT-RSA 2019edited by Mitsuru Matsui. - Cham :Springer International Publishing :2019. - xi, 578 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,114050302-9743 ;. - Lecture notes in computer science ;4891..
Structure-Preserving Certificateless Encryption and its Application -- Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks -- Downgradable Identity-based Encryption and Applications -- Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle) -- An Improved RNS Variant of the BFV Homomorphic Encryption Scheme -- New techniques for multi-value input homomorphic evaluation and applications -- Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality -- Robust Encryption, Extended -- Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model -- Doubly half-injective PRGs for incompressible white-box cryptography -- Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-Party Computation -- Lossy Trapdoor Permutations with Improved Lossiness -- Post-Quantum EPID Signatures from Symmetric Primitives -- Assessment of the key reuse resilience of NewHope -- Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions -- Linking Stam's Bounds With Generalized Truncation -- Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling -- Efficient Fully-Leakage Resilient One-More Signature Schemes -- MILP-based Differential Attack on Round-reduced GIFT -- Quantum Chosen-Ciphertext Attacks against Feistel Ciphers -- Automatic Search for A Variant of Division Property Using Three Subsets -- Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations -- Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks -- EPIC: Efficient Private Image Classification (or: Learning from the Masters) -- Context Hiding Multi-Key Linearly Homomorphic Authenticators -- Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation -- Delegatable Anonymous Credentials from Mercurial Signatures -- Accountable Tracing Signatures from Lattices.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.
ISBN: 9783030126124$q(electronic bk.)
Standard No.: 10.1007/978-3-030-12612-4doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / C79 2019
Dewey Class. No.: 005.824
Topics in cryptology - CT-RSA 2019the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /
LDR
:03701nmm a2200373 a 4500
001
586953
003
DE-He213
005
20200704174824.0
006
m d
007
cr nn 008maaau
008
210326s2019 sz s 0 eng d
020
$a
9783030126124$q(electronic bk.)
020
$a
9783030126117$q(paper)
024
7
$a
10.1007/978-3-030-12612-4
$2
doi
035
$a
978-3-030-12612-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C79 2019
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
C957 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Topics in cryptology - CT-RSA 2019
$h
[electronic resource] :
$b
the Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019 : proceedings /
$c
edited by Mitsuru Matsui.
246
3
$a
CT-RSA 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xi, 578 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11405
490
1
$a
Security and cryptology
505
0
$a
Structure-Preserving Certificateless Encryption and its Application -- Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks -- Downgradable Identity-based Encryption and Applications -- Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle) -- An Improved RNS Variant of the BFV Homomorphic Encryption Scheme -- New techniques for multi-value input homomorphic evaluation and applications -- Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality -- Robust Encryption, Extended -- Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model -- Doubly half-injective PRGs for incompressible white-box cryptography -- Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-Party Computation -- Lossy Trapdoor Permutations with Improved Lossiness -- Post-Quantum EPID Signatures from Symmetric Primitives -- Assessment of the key reuse resilience of NewHope -- Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions -- Linking Stam's Bounds With Generalized Truncation -- Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling -- Efficient Fully-Leakage Resilient One-More Signature Schemes -- MILP-based Differential Attack on Round-reduced GIFT -- Quantum Chosen-Ciphertext Attacks against Feistel Ciphers -- Automatic Search for A Variant of Division Property Using Three Subsets -- Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations -- Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks -- EPIC: Efficient Private Image Classification (or: Learning from the Masters) -- Context Hiding Multi-Key Linearly Homomorphic Authenticators -- Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation -- Delegatable Anonymous Credentials from Mercurial Signatures -- Accountable Tracing Signatures from Lattices.
520
$a
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Coding and Information Theory.
$3
273763
650
2 4
$a
Computers and Society.
$3
273764
650
2 4
$a
Software Engineering.
$3
274511
650
2 4
$a
Artificial Intelligence.
$3
212515
700
1
$a
Matsui, Mitsuru.
$3
280110
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-12612-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000190738
電子館藏
1圖書
電子書
EB QA76.9.A25 C957 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-12612-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login