Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advances in Cryptology – CRYPTO 2019...
~
Boldyreva, Alexandra.
Advances in Cryptology – CRYPTO 2019 = 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Advances in Cryptology – CRYPTO 2019/ edited by Alexandra Boldyreva, Daniele Micciancio.
Reminder of title:
39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /
other author:
Boldyreva, Alexandra.
Description:
XV, 859 p. 536 illus., 48 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science). -
Online resource:
https://doi.org/10.1007/978-3-030-26954-8
ISBN:
9783030269548
Advances in Cryptology – CRYPTO 2019 = 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /
Advances in Cryptology – CRYPTO 2019
39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /[electronic resource] :edited by Alexandra Boldyreva, Daniele Micciancio. - 1st ed. 2019. - XV, 859 p. 536 illus., 48 illus. in color.online resource. - Security and Cryptology ;11694. - Security and Cryptology ;9241.
Trapdoor Functions -- Trapdoor Hash Functions and Their Applications -- CCA Security and Trapdoor Functions via Key-Dependent-Message Security -- Zero Knowledge I -- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs -- Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge -- On Round Optimal Statistical Zero Knowledge Arguments -- Signatures and Messaging -- Repudiability and Claimability of Ring Signatures -- Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations -- Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption -- Obfuscation -- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map -- Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification -- Watermarking -- Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs -- Watermarking Public-Key Cryptographic Primitives -- Secure Computation -- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension -- Universally Composable Secure Computation with Corrupted Tokens -- Reusable Non-Interactive Secure Computation -- Efficient Pseudorandom Correlation Generators: Silent OT Extension and More -- Various Topics -- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously -- Non-Interactive Non-Malleability from Quantum Supremacy -- Cryptographic Sensing -- Public-Key Cryptography in the Fine-Grained Setting -- Zero Knowledge II -- Exploring Constructions of Compact NIZKs from Various Assumptions -- New Constructions of Reusable Designated-Verifier NIZKs -- Scalable Zero Knowledge with no Trusted Setup -- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation -- Key Exchange and Broadcast Encryption -- Highly Efficient Key Exchange Protocols with Optimal Tightness -- Strong Asymmetric PAKE based on Trapdoor CKEM -- Broadcast and Trace with N∈ Ciphertext Size from Standard Assumptions -- .
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019. The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections: Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse. Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations. Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.
ISBN: 9783030269548
Standard No.: 10.1007/978-3-030-26954-8doiSubjects--Topical Terms:
1051084
Data encryption (Computer science).
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Advances in Cryptology – CRYPTO 2019 = 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /
LDR
:04601nam a22004215i 4500
001
1010303
003
DE-He213
005
20200708104524.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030269548
$9
978-3-030-26954-8
024
7
$a
10.1007/978-3-030-26954-8
$2
doi
035
$a
978-3-030-26954-8
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Advances in Cryptology – CRYPTO 2019
$h
[electronic resource] :
$b
39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III /
$c
edited by Alexandra Boldyreva, Daniele Micciancio.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XV, 859 p. 536 illus., 48 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11694
505
0
$a
Trapdoor Functions -- Trapdoor Hash Functions and Their Applications -- CCA Security and Trapdoor Functions via Key-Dependent-Message Security -- Zero Knowledge I -- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs -- Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge -- On Round Optimal Statistical Zero Knowledge Arguments -- Signatures and Messaging -- Repudiability and Claimability of Ring Signatures -- Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations -- Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption -- Obfuscation -- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map -- Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification -- Watermarking -- Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs -- Watermarking Public-Key Cryptographic Primitives -- Secure Computation -- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension -- Universally Composable Secure Computation with Corrupted Tokens -- Reusable Non-Interactive Secure Computation -- Efficient Pseudorandom Correlation Generators: Silent OT Extension and More -- Various Topics -- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously -- Non-Interactive Non-Malleability from Quantum Supremacy -- Cryptographic Sensing -- Public-Key Cryptography in the Fine-Grained Setting -- Zero Knowledge II -- Exploring Constructions of Compact NIZKs from Various Assumptions -- New Constructions of Reusable Designated-Verifier NIZKs -- Scalable Zero Knowledge with no Trusted Setup -- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation -- Key Exchange and Broadcast Encryption -- Highly Efficient Key Exchange Protocols with Optimal Tightness -- Strong Asymmetric PAKE based on Trapdoor CKEM -- Broadcast and Trace with N∈ Ciphertext Size from Standard Assumptions -- .
520
$a
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019. The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections: Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse. Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations. Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Software engineering.
$3
562952
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
0
$a
Computers.
$3
565115
650
0
$a
Computers and civilization.
$3
556557
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computers and Society.
$3
669900
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Boldyreva, Alexandra.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1281550
700
1
$a
Micciancio, Daniele.
$e
editor.
$1
https://orcid.org/0000-0003-3323-9985
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1299232
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030269531
776
0 8
$i
Printed edition:
$z
9783030269555
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-26954-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login