Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advances in cryptology - EUROCRYPT 2...
~
(1998 :)
Advances in cryptology - EUROCRYPT 202140th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.Part II /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Advances in cryptology - EUROCRYPT 2021edited by Anne Canteaut, Francois-Xavier Standaert.
Reminder of title:
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.
remainder title:
EUROCRYPT 2021
other author:
Canteaut, Anne.
corporate name:
Published:
Cham :Springer International Publishing :2021.
Description:
xv, 933 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-3-030-77886-6
ISBN:
9783030778866$q(electronic bk.)
Advances in cryptology - EUROCRYPT 202140th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.Part II /
Advances in cryptology - EUROCRYPT 2021
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.Part II /[electronic resource] :EUROCRYPT 2021edited by Anne Canteaut, Francois-Xavier Standaert. - Cham :Springer International Publishing :2021. - xv, 933 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,126970302-9743 ;. - Lecture notes in computer science ;4891..
Symmetric Designs -- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields -- Mind the Middle Layer: The HADES Design Strategy Revisited -- Password Hashing and Preprocessing -- Compactness of Hashing Modes and Efficiency beyond Merkle Tree -- Real-World Cryptanalysis -- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 -- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 -- Implementation Issues -- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power of Expansion: More Efficient Constructions in the Random Probing Model -- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages -- Leakage, Faults and Tampering -- Leakage Resilient Value Comparison With Application to Message Authentication -- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free -- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem -- Multi-Source Non-Malleable Extractors and Applications -- Quantum Constructions and Proofs -- Secure Software Leasing -- Oblivious Transfer is in MiniQCrypt -- Security Analysis of Quantum Lightning -- Classical vs Quantum Random Oracles -- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work -- Classical proofs of quantum knowledge -- Multiparty Computation -- Order-C Secure Multiparty Computation for Highly Repetitive Circuits -- The More The Merrier: Reducing the Cost of Large Scale MPC -- Multi-Party Reusable Non-Interactive Secure Computation from LWE -- Unbounded Multi-Party Computation from Learning with Errors -- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation -- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields -- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN -- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation -- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
ISBN: 9783030778866$q(electronic bk.)
Standard No.: 10.1007/978-3-030-77886-6doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / E87 2021
Dewey Class. No.: 005.824
Advances in cryptology - EUROCRYPT 202140th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.Part II /
LDR
:04552nmm a2200373 a 4500
001
602032
003
DE-He213
005
20210624180516.0
006
m d
007
cr nn 008maaau
008
211112s2021 sz s 0 eng d
020
$a
9783030778866$q(electronic bk.)
020
$a
9783030778859$q(paper)
024
7
$a
10.1007/978-3-030-77886-6
$2
doi
035
$a
978-3-030-77886-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
E87 2021
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
E89 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Advances in cryptology - EUROCRYPT 2021
$h
[electronic resource] :
$b
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021 : proceedings.
$n
Part II /
$c
edited by Anne Canteaut, Francois-Xavier Standaert.
246
3
$a
EUROCRYPT 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 933 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12697
490
1
$a
Security and cryptology
505
0
$a
Symmetric Designs -- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields -- Mind the Middle Layer: The HADES Design Strategy Revisited -- Password Hashing and Preprocessing -- Compactness of Hashing Modes and Efficiency beyond Merkle Tree -- Real-World Cryptanalysis -- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 -- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 -- Implementation Issues -- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power of Expansion: More Efficient Constructions in the Random Probing Model -- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages -- Leakage, Faults and Tampering -- Leakage Resilient Value Comparison With Application to Message Authentication -- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free -- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem -- Multi-Source Non-Malleable Extractors and Applications -- Quantum Constructions and Proofs -- Secure Software Leasing -- Oblivious Transfer is in MiniQCrypt -- Security Analysis of Quantum Lightning -- Classical vs Quantum Random Oracles -- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work -- Classical proofs of quantum knowledge -- Multiparty Computation -- Order-C Secure Multiparty Computation for Highly Repetitive Circuits -- The More The Merrier: Reducing the Cost of Large Scale MPC -- Multi-Party Reusable Non-Interactive Secure Computation from LWE -- Unbounded Multi-Party Computation from Learning with Errors -- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation -- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields -- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN -- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation -- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
520
$a
The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Coding and Information Theory.
$3
273763
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Canteaut, Anne.
$3
577017
700
1
$a
Standaert, Francois-Xavier.
$3
306004
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-77886-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000199682
電子館藏
1圖書
電子書
EB QA76.9.A25 E89 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-77886-6
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login