| TÃtulo : |
22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Adhikari, Avishek, ; Küsters, Ralf, ; Preneel, Bart, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIX, 634 p. 130 ilustraciones, 51 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-92518-5 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información IngenierÃa de software Red de computadoras Protección de datos CriptologÃa TeorÃa de la codificación y la información Redes de comunicación informática Servicios de seguridad |
| Ãndice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas de la 22.ª Conferencia Internacional sobre CriptologÃa en la India, INDOCRYPT 2021, que se celebró en Jaipur, India, del 12 al 15 de diciembre de 2021. Los 27 artÃculos completos incluidos en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 65 presentaciones. Estaban organizados en secciones temáticas de la siguiente manera: cifrado autenticado; criptografÃa simétrica; criptografÃa ligera; ataques de canal lateral; ataques de fallas; criptografÃa poscuántica; cifrado y protocolos de clave pública; construcciones criptográficas; cadenas de bloques. |
| Nota de contenido: |
Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attackon Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Veriï¬able Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certiï¬able Proofs (or, Can a Blockchain Verify a Designated-Veriï¬er Proof?). |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings [documento electrónico] / Adhikari, Avishek, ; Küsters, Ralf, ; Preneel, Bart, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIX, 634 p. 130 ilustraciones, 51 ilustraciones en color. ISBN : 978-3-030-92518-5 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información IngenierÃa de software Red de computadoras Protección de datos CriptologÃa TeorÃa de la codificación y la información Redes de comunicación informática Servicios de seguridad |
| Ãndice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas de la 22.ª Conferencia Internacional sobre CriptologÃa en la India, INDOCRYPT 2021, que se celebró en Jaipur, India, del 12 al 15 de diciembre de 2021. Los 27 artÃculos completos incluidos en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 65 presentaciones. Estaban organizados en secciones temáticas de la siguiente manera: cifrado autenticado; criptografÃa simétrica; criptografÃa ligera; ataques de canal lateral; ataques de fallas; criptografÃa poscuántica; cifrado y protocolos de clave pública; construcciones criptográficas; cadenas de bloques. |
| Nota de contenido: |
Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attackon Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Veriï¬able Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certiï¬able Proofs (or, Can a Blockchain Verify a Designated-Veriï¬er Proof?). |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |