Cryptology and Network Security
22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings
Herausgegeben:Deng, Jing; Kolesnikov, Vladimir; Schwarzmann, Alexander A.
Cryptology and Network Security
22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings
Herausgegeben:Deng, Jing; Kolesnikov, Vladimir; Schwarzmann, Alexander A.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
Andere Kunden interessierten sich auch für
Cryptology and Network Security50,99 €
Cryptology and Network Security44,99 €
Cryptology and Network Security57,99 €
Cryptology and Network Security76,99 €
Security and Cryptography for Networks83,99 €
Cryptology and Network Security76,99 €
Information Security and Cryptology - ICISC 201938,99 €-
-
-
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.
The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections:
Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections:
Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14342
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-7562-4
- 1st ed. 2023
- Seitenzahl: 612
- Erscheinungstermin: 31. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 33mm
- Gewicht: 914g
- ISBN-13: 9789819975624
- ISBN-10: 981997562X
- Artikelnr.: 68981807
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 14342
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-7562-4
- 1st ed. 2023
- Seitenzahl: 612
- Erscheinungstermin: 31. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 33mm
- Gewicht: 914g
- ISBN-13: 9789819975624
- ISBN-10: 981997562X
- Artikelnr.: 68981807
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
Schemes I.- Forward Security under Leakage Resilience, Revisited.- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE.- Signatures with Delegation.- Basic Primitives.- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.- Hardness of Learning AES with Gradient-based Methods.- Security.- Privacy-Preserving Digital Vaccine Passport .- Exploiting Android Browser.- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.- MPC with Cards.- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols.- Free-XOR in Card-based Garbled Circuits.- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.- Key Filtering in Cube Attacks from the Implementation Aspect.- New Techniques for Modeling SBoxes: An MILP Approach.- Blockchain.-
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.-A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.-A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
Schemes I.- Forward Security under Leakage Resilience, Revisited.- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE.- Signatures with Delegation.- Basic Primitives.- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.- Hardness of Learning AES with Gradient-based Methods.- Security.- Privacy-Preserving Digital Vaccine Passport .- Exploiting Android Browser.- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.- MPC with Cards.- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols.- Free-XOR in Card-based Garbled Circuits.- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.- Key Filtering in Cube Attacks from the Implementation Aspect.- New Techniques for Modeling SBoxes: An MILP Approach.- Blockchain.-
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.-A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.-A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.







