Title:
Progress in Cryptology - AFRICACRYPT 2023 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings
Author:
El Mrabet, Nadia. editor.
ISBN:
9783031376795
Edition:
1st ed. 2023.
Physical Description:
XIII, 518 p. 64 illus., 35 illus. in color. online resource.
Series:
Lecture Notes in Computer Science, 14064
Contents:
Post-quantum cryptography -- MinRank in the Head: Short Signatures from Zero-Knowledge Proofs -- Take your MEDS: Digital Signatures from Matrix Code Equivalence -- Efficient computation of (3^n,3^n)-isogenies -- On the Post-Quantum Security of Classical Authenticated Encryption Schemes -- A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial -- Symmetric cryptography -- Universal hashing based on field multiplication and (near-)MDS matrices -- Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit groups -- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Blockchain -- The curious case of the half-half Bitcoin ECDSA nonces -- Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality -- Lattice-based cryptography -- ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain -- Concrete Security from Worst-Case to Average-Case Lattice Reductions -- Finding and Evaluating Parameters for BGV -- Quantum Search-to-Decision Reduction for the LWE Problem -- Implementations -- Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions -- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7 -- Theory -- Impossibilities in Succinct Arguments: Black-box Extraction and More -- Applications of Timed-release Encryption with Implicit Authentication.
Added Corporate Author:
Electronic Access:
https://doi.org/10.1007/978-3-031-37679-5Copies:
Available:*
Library | Material Type | Item Barcode | Shelf Number | Status | Item Holds |
---|---|---|---|---|---|
Searching... | E-Book | 521092-1001 | XX(521092.1) | Searching... | Searching... |