Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings için kapak resmi
Başlık:
Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings
Yazar:
Katz, Jonathan. editor.
ISBN:
9783662464472
Basım Bilgisi:
1st ed. 2015.
Fiziksel Tanımlama:
XIV, 824 p. 123 illus. online resource.
Seri:
Security and Cryptology, 9020
İçerik:
Public-Key Encryption -- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms -- On the Selective Opening Security of Practical Public-Key Encryption Schemes -- How Secure is Deterministic Encryption? -- E-Cash -- Divisible E-Cash Made Practical -- Anonymous Transferable E-Cash -- Cryptanalysis -- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem -- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems -- A Polynomial-Time Attack on the BBCRS Scheme -- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case -- Digital Signatures -- Digital Signatures from Strong RSA without Prime Generation -- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions -- Tightly-Secure Signatures from Chameleon Hash Functions -- Password-Based Authentication -- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions -- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography -- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks -- Pairing-Based Cryptography -- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds -- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups -- Digital Signatures -- Simpler Efficient Group Signatures from Lattices -- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based -- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model -- Efficient Constructions -- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model -- Additively Homomorphic UC Commitments with Optimal Amortized Overhead -- Interactive Message-Locked Encryption and Secure Deduplication -- Faster ECC over F2521_1 -- Cryptography with Imperfect Keys -- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security -- A Tamper and Leakage Resilient von Neumann Architecture -- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification -- Interactive Proofs -- Adaptive Proofs of Knowledge in the Random Oracle Model -- Making Sigma-Protocols Non-interactive Without Random Oracles -- Lattice-Based Cryptography -- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q -- Packing Messages and Optimizing Bootstrapping in GSW-FHE -- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions -- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products -- Predicate Encryption for Multi-Dimensional Range Queries from Lattices -- On the Practical Security of Inner Product Functional Encryption -- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Yazar Ek Girişi:
Tüzel Kişi Ek Girişi:
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 519134-1001 XX(519134.1)
Arıyor...

On Order