Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advances in Cryptology – EUROCRYPT 2...
~
Standaert, François-Xavier.
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Advances in Cryptology – EUROCRYPT 2021/ edited by Anne Canteaut, François-Xavier Standaert.
Reminder of title:
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
other author:
Standaert, François-Xavier.
Description:
XIV, 587 p. 60 illus., 3 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Information Systems Applications (incl. Internet). -
Online resource:
https://doi.org/10.1007/978-3-030-77883-5
ISBN:
9783030778835
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
Advances in Cryptology – EUROCRYPT 2021
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /[electronic resource] :edited by Anne Canteaut, François-Xavier Standaert. - 1st ed. 2021. - XIV, 587 p. 60 illus., 3 illus. in color.online resource. - Security and Cryptology ;12698. - Security and Cryptology ;9241.
Garbled Circuits -- LogStack: Stacked Garbling with O(b log b) Computation -- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits -- Threshold Garbled Circuits and Ad Hoc Secure Computation -- Indistinguishability Obfuscation -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments -- Zero-Knowledge Proofs -- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers -- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments -- Towards Accountability in CRS Generation -- Property-Preserving Hash Functions and ORAM -- Robust Property-Preserving Hash Functions for Hamming Distance and More -- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution -- Structured Encryption and Dynamic Leakage Suppression -- Blockchain -- Dynamic Ad Hoc Clock Synchronization -- TARDIS: A Foundation of Time-Lock Puzzles in UC -- Privacy and Law Enforcement -- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy -- Non-Interactive Anonymous Router -- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures -- Abuse Resistant Law Enforcement Access Systems. .
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
ISBN: 9783030778835
Standard No.: 10.1007/978-3-030-77883-5doiSubjects--Topical Terms:
881699
Information Systems Applications (incl. Internet).
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Advances in Cryptology – EUROCRYPT 2021 = 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
LDR
:04117nam a22004215i 4500
001
1055551
003
DE-He213
005
20210826185809.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030778835
$9
978-3-030-77883-5
024
7
$a
10.1007/978-3-030-77883-5
$2
doi
035
$a
978-3-030-77883-5
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Advances in Cryptology – EUROCRYPT 2021
$h
[electronic resource] :
$b
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III /
$c
edited by Anne Canteaut, François-Xavier Standaert.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIV, 587 p. 60 illus., 3 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12698
505
0
$a
Garbled Circuits -- LogStack: Stacked Garbling with O(b log b) Computation -- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits -- Threshold Garbled Circuits and Ad Hoc Secure Computation -- Indistinguishability Obfuscation -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments -- Zero-Knowledge Proofs -- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers -- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments -- Towards Accountability in CRS Generation -- Property-Preserving Hash Functions and ORAM -- Robust Property-Preserving Hash Functions for Hamming Distance and More -- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution -- Structured Encryption and Dynamic Leakage Suppression -- Blockchain -- Dynamic Ad Hoc Clock Synchronization -- TARDIS: A Foundation of Time-Lock Puzzles in UC -- Privacy and Law Enforcement -- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy -- Non-Interactive Anonymous Router -- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures -- Abuse Resistant Law Enforcement Access Systems. .
520
$a
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
650
0
$a
Information theory.
$3
595305
650
0
$a
Coding theory.
$3
561460
650
0
$a
Computer organization.
$3
596298
650
0
$a
Data encryption (Computer science).
$3
1051084
700
1
$a
Standaert, François-Xavier.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1273659
700
1
$a
Canteaut, Anne.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
864980
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030778828
776
0 8
$i
Printed edition:
$z
9783030778842
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-77883-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login