E-Book, Englisch, 810 Seiten, eBook
Reihe: Security and Cryptology
Malkin / Peikert Advances in Cryptology – CRYPTO 2021
1. Auflage 2021
ISBN: 978-3-030-84252-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III
E-Book, Englisch, 810 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-030-84252-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Models.- A Rational Protocol Treatment of 51% Attacks.- MoSS: Modular Security Specifications Framework.- Tight State-Restoration Soundness in the Algebraic Group Model.- Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.- Applied Cryptography and Side Channels.- Provable Security Analysis of FIDO2-. SSE and SSD: Page-Efficient Searchable Symmetric Encryption.- Towards Tight Random Probing Security.- Secure Wire Shuffling in the Probing Model.- Cryptanalysis.- Differential-Linear Cryptanalysis from an Algebraic Perspective.- Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks.- Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting.- Thinking Outside the Superbox.- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3.- Improved torsion-point attacks on SIDH variants.- Codes and Extractors.- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.- Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.- Non-Malleable Codes for Bounded Parallel-Time Tampering.- Improved Computational Extractors and their Applications.- Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.- Secret Sharing.- Upslices, Downslices, and Secret-Sharing with Complexity of 1.5 n .- Asymptotically-Good Arithmetic Secret Sharing over Z/ p l Z with Strong Multiplication and Its Applications to Efficient MPC.- Large Message Homomorphic Secret Sharing from DCR and Applications.- Traceable Secret Sharing and Applications.- Quadratic Secret Sharing and Conditional Disclosure of Secrets.- Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.