Información del autor
Autor Wang, Huaxiong |
Documentos disponibles escritos por este autor (8)



14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings / Nguyen, Khoa ; Wu, Wenling ; Lam, Kwok Yan ; Wang, Huaxiong
![]()
TÃtulo : 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings Tipo de documento: documento electrónico Autores: Nguyen, Khoa, ; Wu, Wenling, ; Lam, Kwok Yan, ; Wang, Huaxiong, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XIII, 423 p. 123 ilustraciones, 14 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-62576-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Red de computadoras Estructuras de datos (Informática) TeorÃa de la información IngenierÃa de software Ordenadores CriptologÃa IngenierÃa Informática y Redes Estructuras de datos y teorÃa de la información Entornos informáticos Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Seguridad Demostrable, ProvSec 2020, celebrada en Singapur en noviembre de 2020. Los 20 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados entre 59 presentaciones. Los artÃculos se centran en la seguridad demostrable como una herramienta esencial para analizar la seguridad de las primitivas criptográficas modernas. Se dividen en las siguientes secciones temáticas: esquemas de firma, esquemas de cifrado y NIZKS, aprendizaje automático seguro y computación multipartita, esquemas de intercambio de secretos y análisis de seguridad. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings [documento electrónico] / Nguyen, Khoa, ; Wu, Wenling, ; Lam, Kwok Yan, ; Wang, Huaxiong, . - 1 ed. . - [s.l.] : Springer, 2020 . - XIII, 423 p. 123 ilustraciones, 14 ilustraciones en color.
ISBN : 978-3-030-62576-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Red de computadoras Estructuras de datos (Informática) TeorÃa de la información IngenierÃa de software Ordenadores CriptologÃa IngenierÃa Informática y Redes Estructuras de datos y teorÃa de la información Entornos informáticos Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas de la 14.ª Conferencia Internacional sobre Seguridad Demostrable, ProvSec 2020, celebrada en Singapur en noviembre de 2020. Los 20 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados entre 59 presentaciones. Los artÃculos se centran en la seguridad demostrable como una herramienta esencial para analizar la seguridad de las primitivas criptográficas modernas. Se dividen en las siguientes secciones temáticas: esquemas de firma, esquemas de cifrado y NIZKS, aprendizaje automático seguro y computación multipartita, esquemas de intercambio de secretos y análisis de seguridad. *La conferencia se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I / Moriai, Shiho ; Wang, Huaxiong
![]()
TÃtulo : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I Tipo de documento: documento electrónico Autores: Moriai, Shiho, ; Wang, Huaxiong, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XXVII, 914 p. 123 ilustraciones ISBN/ISSN/DL: 978-3-030-64837-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Red de computadoras TeorÃa de la codificación TeorÃa de la información Software de la aplicacion CriptologÃa Seguridad de datos e información Redes de comunicación informática TeorÃa de la codificación y la información Aplicaciones informáticas y de sistemas de información Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to BuildOptimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I [documento electrónico] / Moriai, Shiho, ; Wang, Huaxiong, . - 1 ed. . - [s.l.] : Springer, 2020 . - XXVII, 914 p. 123 ilustraciones.
ISBN : 978-3-030-64837-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Red de computadoras TeorÃa de la codificación TeorÃa de la información Software de la aplicacion CriptologÃa Seguridad de datos e información Redes de comunicación informática TeorÃa de la codificación y la información Aplicaciones informáticas y de sistemas de información Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to BuildOptimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II / Moriai, Shiho ; Wang, Huaxiong
![]()
TÃtulo : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II Tipo de documento: documento electrónico Autores: Moriai, Shiho, ; Wang, Huaxiong, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XV, 818 p. 141 ilustraciones, 34 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-64834-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Red de computadoras Protección de datos Software de la aplicacion Ordenadores CriptologÃa Redes de comunicación informática Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Entornos informáticos Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II [documento electrónico] / Moriai, Shiho, ; Wang, Huaxiong, . - 1 ed. . - [s.l.] : Springer, 2020 . - XV, 818 p. 141 ilustraciones, 34 ilustraciones en color.
ISBN : 978-3-030-64834-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Red de computadoras Protección de datos Software de la aplicacion Ordenadores CriptologÃa Redes de comunicación informática Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Entornos informáticos Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III / Moriai, Shiho ; Wang, Huaxiong
![]()
TÃtulo : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III Tipo de documento: documento electrónico Autores: Moriai, Shiho, ; Wang, Huaxiong, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XV, 904 p. 153 ilustraciones, 31 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-64840-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Red de computadoras TeorÃa de la codificación TeorÃa de la información Software de la aplicacion CriptologÃa Seguridad de datos e información Redes de comunicación informática TeorÃa de la codificación y la información Aplicaciones informáticas y de sistemas de información Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly/An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III [documento electrónico] / Moriai, Shiho, ; Wang, Huaxiong, . - 1 ed. . - [s.l.] : Springer, 2020 . - XV, 904 p. 153 ilustraciones, 31 ilustraciones en color.
ISBN : 978-3-030-64840-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Protección de datos Red de computadoras TeorÃa de la codificación TeorÃa de la información Software de la aplicacion CriptologÃa Seguridad de datos e información Redes de comunicación informática TeorÃa de la codificación y la información Aplicaciones informáticas y de sistemas de información Clasificación: 5.824 Resumen: Las actas de tres volúmenes LNCS 12491, 12492 y 12493 constituyen las actas de la 26.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2020, que se celebró del 7 al 11 de diciembre de 2020. Se planeó que la conferencia se llevará a cabo en Daejeon, Corea del Sur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 85 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 316 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; esquemas de cifrado.- criptografÃa poscuántica; criptoanálisis; criptografÃa de clave simétrica; códigos de autenticación de mensajes; análisis de canal lateral. Parte II: criptografÃa de clave pública; criptografÃa basada en celosÃa; criptografÃa basada en isogenia; algoritmos cuánticos; intercambio de claves autenticado. Parte III: computación multipartita; intercambio de secretos; cifrado basado en atributos; cifrado actualizable; conocimiento cero; blockchains y rastreo de contactos. . Nota de contenido: Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly/An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Tipo de medio : Computadora Summary : The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I / Tibouchi, Mehdi ; Wang, Huaxiong
![]()
TÃtulo : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I Tipo de documento: documento electrónico Autores: Tibouchi, Mehdi, ; Wang, Huaxiong, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXIII, 699 p. 98 ilustraciones, 45 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-92062-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Estructuras de datos (Informática) TeorÃa de la información Software de la aplicacion Red de computadoras Protección de datos CriptologÃa Estructuras de datos y teorÃa de la información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Clasificación: 5.824 Resumen: Las actas de cuatro volúmenes LNCS 13090, 13091, 13092 y 13093 constituyen las actas de la 27.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2021, que se celebró del 6 al 10 de diciembre de 2021. La conferencia fue Estaba previsto que se llevara a cabo en Singapur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 95 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 341 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; criptoanálisis de clave pública; criptoanálisis de clave simétrica; seguridad cuántica; Parte II: ataques fÃsicos, filtraciones y contramedidas; computación multipartita; cifrado de clave pública mejorado y acertijos de bloqueo de tiempo; protocolos del mundo real; Parte III: NIZK y SNARK; teorÃa; construcciones de clave simétrica; cifrado homomórfico y búsqueda cifrada; Parte IV: Criptoanálisis de celosÃa; criptografÃa poscuántica; cifrado y firmas avanzados; pruebas de conocimiento cero, umbral y firmas múltiples; intercambio de claves autenticado. Nota de contenido: On the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework forKey-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption. Tipo de medio : Computadora Summary : The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I [documento electrónico] / Tibouchi, Mehdi, ; Wang, Huaxiong, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXIII, 699 p. 98 ilustraciones, 45 ilustraciones en color.
ISBN : 978-3-030-92062-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Estructuras de datos (Informática) TeorÃa de la información Software de la aplicacion Red de computadoras Protección de datos CriptologÃa Estructuras de datos y teorÃa de la información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Clasificación: 5.824 Resumen: Las actas de cuatro volúmenes LNCS 13090, 13091, 13092 y 13093 constituyen las actas de la 27.ª Conferencia Internacional sobre TeorÃa y Aplicación de la CriptologÃa y la Seguridad de la Información, ASIACRYPT 2021, que se celebró del 6 al 10 de diciembre de 2021. La conferencia fue Estaba previsto que se llevara a cabo en Singapur, pero cambió a un formato en lÃnea debido a la pandemia de COVID-19. El total de 95 artÃculos completos presentados en estas actas fue cuidadosamente revisado y seleccionado entre 341 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Premios al mejor artÃculo; criptoanálisis de clave pública; criptoanálisis de clave simétrica; seguridad cuántica; Parte II: ataques fÃsicos, filtraciones y contramedidas; computación multipartita; cifrado de clave pública mejorado y acertijos de bloqueo de tiempo; protocolos del mundo real; Parte III: NIZK y SNARK; teorÃa; construcciones de clave simétrica; cifrado homomórfico y búsqueda cifrada; Parte IV: Criptoanálisis de celosÃa; criptografÃa poscuántica; cifrado y firmas avanzados; pruebas de conocimiento cero, umbral y firmas múltiples; intercambio de claves autenticado. Nota de contenido: On the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework forKey-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption. Tipo de medio : Computadora Summary : The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II / Tibouchi, Mehdi ; Wang, Huaxiong
![]()
Permalink27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part III / Tibouchi, Mehdi ; Wang, Huaxiong
![]()
Permalink27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part IV / Tibouchi, Mehdi ; Wang, Huaxiong
![]()
Permalink