Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cryptography and Coding -

Cryptography and Coding

17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings

Martin Albrecht (Herausgeber)

Buch | Softcover
VIII, 367 Seiten
2019 | 1st ed. 2019
Springer International Publishing (Verlag)
978-3-030-35198-4 (ISBN)
CHF 74,85 inkl. MwSt

This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.- Decryption Algorithm Substitution Attacks.- Subversion-Resistant Simulation (Knowledge) Sound NIZKs.- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2.- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.- E cient Fully Secure Leakage-Deterring Encryption.- Sharing the LUOV: Threshold Post-Quantum Signatures.- Commodity-Based 2PC for Arithmetic Circuits.- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions.- Forgery Attacks on FlexAE and FlexAEAD.- Key Recovery Attacks on Some Rank Metric Code-based Signatures.- On the Security of Multikey Homomorphic Encryption.- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations.- Cryptanalysis of a Protocol for E cient Sorting on SHE Encrypted Data.- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.- Distributing any Elliptic Curve Based Protocol.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo VIII, 367 p. 659 illus., 20 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 575 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • authentication • ciphertexts • computer crime • Computer Science • conference proceedings • cryptography • Cryptosystems • data privacy • Data Security • Encryption • Hash Functions • homomorphic encryption • Informatics • Network Security • privacy • privacy preserving • Public Key Cryptography • Research • Software engineering
ISBN-10 3-030-35198-X / 303035198X
ISBN-13 978-3-030-35198-4 / 9783030351984
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich