Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Selected areas in cryptography - SAC 2024 = 31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.. Part I /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Selected areas in cryptography - SAC 2024/ edited by Maria Eichlseder, Sébastien Gambs.
Reminder of title:
31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.
remainder title:
SAC 2024
other author:
Eichlseder, Maria.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xviii, 312 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science) -
Online resource:
https://doi.org/10.1007/978-3-031-82852-2
ISBN:
9783031828522
Selected areas in cryptography - SAC 2024 = 31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.. Part I /
Selected areas in cryptography - SAC 2024
31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.Part I /[electronic resource] :SAC 2024edited by Maria Eichlseder, Sébastien Gambs. - Cham :Springer Nature Switzerland :2025. - xviii, 312 p. :ill., digital ;24 cm. - Lecture notes in computer science,155161611-3349 ;. - Lecture notes in computer science ;6140..
Privacy-Preserving Cryptography. -- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification. -- Simulation Secure Multi-Input Quadratic Functional Encryption. -- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples. -- Multi-Key Homomorphic Encryption with Threshold Re-Encryption. -- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives. -- Post-Quantum Cryptography. -- BUFFing FALCON without Increasing the Signature Size. -- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. -- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications. -- Attacks on Public-Key Cryptography. -- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA. -- Multivariate Blind Signatures Revisited. -- Post-Quantum Backdoor for Kyber-KEM. -- Identity-based Encryption. -- Identity-Based Encryption from Lattices with More Compactness in the Standard Model. -- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024. The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption. Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.
ISBN: 9783031828522
Standard No.: 10.1007/978-3-031-82852-2doiSubjects--Topical Terms:
658943
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / S33 2024
Dewey Class. No.: 005.8
Selected areas in cryptography - SAC 2024 = 31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.. Part I /
LDR
:03068nam a2200373 a 4500
001
1160860
003
DE-He213
005
20250313115243.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031828522
$q
(electronic bk.)
020
$a
9783031828515
$q
(paper)
024
7
$a
10.1007/978-3-031-82852-2
$2
doi
035
$a
978-3-031-82852-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
S33 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S119 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Selected areas in cryptography - SAC 2024
$h
[electronic resource] :
$b
31st International Conference, Montreal, QC, Canada, August 28-30, 2024 : revised selected papers.
$n
Part I /
$c
edited by Maria Eichlseder, Sébastien Gambs.
246
3
$a
SAC 2024
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xviii, 312 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15516
505
0
$a
Privacy-Preserving Cryptography. -- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification. -- Simulation Secure Multi-Input Quadratic Functional Encryption. -- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples. -- Multi-Key Homomorphic Encryption with Threshold Re-Encryption. -- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives. -- Post-Quantum Cryptography. -- BUFFing FALCON without Increasing the Signature Size. -- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. -- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications. -- Attacks on Public-Key Cryptography. -- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA. -- Multivariate Blind Signatures Revisited. -- Post-Quantum Backdoor for Kyber-KEM. -- Identity-based Encryption. -- Identity-Based Encryption from Lattices with More Compactness in the Standard Model. -- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).
520
$a
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024. The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption. Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Computer Engineering and Networks.
$3
1365733
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Security Services.
$3
1211616
700
1
$a
Eichlseder, Maria.
$3
1487825
700
1
$a
Gambs, Sébastien.
$3
1487826
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
6140.
$3
744199
856
4 0
$u
https://doi.org/10.1007/978-3-031-82852-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login
Please sign in
User name
Password
Remember me on this computer
Cancel
Forgot your password?