Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Progress in cryptology - INDOCRYPT 2...
~
(1998 :)
Progress in cryptology - INDOCRYPT 202122nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Progress in cryptology - INDOCRYPT 2021edited by Avishek Adhikari, Ralf Kusters, Bart Preneel.
Reminder of title:
22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /
remainder title:
INDOCRYPT 2021
other author:
Adhikari, Avishek.
corporate name:
Published:
Cham :Springer International Publishing :2021.
Description:
xix, 634 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
CryptographyCongresses.
Online resource:
https://doi.org/10.1007/978-3-030-92518-5
ISBN:
9783030925185$q(electronic bk.)
Progress in cryptology - INDOCRYPT 202122nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /
Progress in cryptology - INDOCRYPT 2021
22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /[electronic resource] :INDOCRYPT 2021edited by Avishek Adhikari, Ralf Kusters, Bart Preneel. - Cham :Springer International Publishing :2021. - xix, 634 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,131430302-9743 ;. - Lecture notes in computer science ;4891..
Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attack on Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?)
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
ISBN: 9783030925185$q(electronic bk.)
Standard No.: 10.1007/978-3-030-92518-5doiSubjects--Topical Terms:
383237
Cryptography
--Congresses.
LC Class. No.: QA76.9.A25 / I58 2021
Dewey Class. No.: 005.824
Progress in cryptology - INDOCRYPT 202122nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /
LDR
:04055nmm a2200373 a 4500
001
612292
003
DE-He213
005
20211208070826.0
006
m d
007
cr nn 008maaau
008
220526s2021 sz s 0 eng d
020
$a
9783030925185$q(electronic bk.)
020
$a
9783030925178$q(paper)
024
7
$a
10.1007/978-3-030-92518-5
$2
doi
035
$a
978-3-030-92518-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2021
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
I61 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Progress in cryptology - INDOCRYPT 2021
$h
[electronic resource] :
$b
22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021 : proceedings /
$c
edited by Avishek Adhikari, Ralf Kusters, Bart Preneel.
246
3
$a
INDOCRYPT 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xix, 634 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13143
490
1
$a
Security and cryptology
505
0
$a
Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attack on Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?)
520
$a
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
650
0
$a
Cryptography
$v
Congresses.
$3
383237
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Coding and Information Theory.
$3
273763
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
273711
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Security Services.
$3
825729
700
1
$a
Adhikari, Avishek.
$3
678104
700
1
$a
Kusters, Ralf.
$3
468747
700
1
$a
Preneel, Bart.
$3
253715
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-92518-5
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000207766
電子館藏
1圖書
電子書
EB QA76.9.A25 I61 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-92518-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login