Progress in Cryptology - INDOCRYPT 2021
22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings
Herausgegeben:Adhikari, Avishek; Küsters, Ralf; Preneel, Bart
Progress in Cryptology - INDOCRYPT 2021
22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings
Herausgegeben:Adhikari, Avishek; Küsters, Ralf; Preneel, Bart
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 22 nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.
The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
Andere Kunden interessierten sich auch für
- Progress in Cryptology - INDOCRYPT 202081,99 €
- Progress in Cryptology - INDOCRYPT 201941,99 €
- Progress in Cryptology ¿ INDOCRYPT 202289,99 €
- Advances in Cryptology - EUROCRYPT 2021105,99 €
- Advances in Cryptology - EUROCRYPT 202173,99 €
- Progress in Cryptology - INDOCRYPT 201841,99 €
- Progress in Cryptology - LATINCRYPT 202165,99 €
-
-
-
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.
The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 13143
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-92517-8
- 1st ed. 2021
- Seitenzahl: 656
- Erscheinungstermin: 9. Dezember 2021
- Englisch
- Abmessung: 235mm x 155mm x 36mm
- Gewicht: 978g
- ISBN-13: 9783030925178
- ISBN-10: 303092517X
- Artikelnr.: 62867056
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 13143
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-92517-8
- 1st ed. 2021
- Seitenzahl: 656
- Erscheinungstermin: 9. Dezember 2021
- Englisch
- Abmessung: 235mm x 155mm x 36mm
- Gewicht: 978g
- ISBN-13: 9783030925178
- ISBN-10: 303092517X
- Artikelnr.: 62867056
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Authenticated Encryption.- Revisiting the Security of COMET Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.- Symmetric Cryptography.- Crooked Indi erentiability of Enveloped XOR Revisited.- Sequential Indi erentiability of Confusion-Di usion Networks.- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.- Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm.- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks.- Side-Channel Attacks.- Analyzing Masked Ciphers Against Transition and Coupling E ects.- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.- Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.- Di erential Fault Attackon Espresso.- Di erential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization.- Fault-Enabled Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.- Public Key Encryption and Protocols.- Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain.- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.- Cryptographic Constructions.- Exipnos: An E cient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.- On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal Circuit Assumptions.- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?).
Authenticated Encryption.- Revisiting the Security of COMET Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.- Symmetric Cryptography.- Crooked Indi erentiability of Enveloped XOR Revisited.- Sequential Indi erentiability of Confusion-Di usion Networks.- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.- Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm.- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks.- Side-Channel Attacks.- Analyzing Masked Ciphers Against Transition and Coupling E ects.- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.- Improving First-Order Threshold Implementations of SKINNY.- Fault Attacks.- Di erential Fault Attackon Espresso.- Di erential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization.- Fault-Enabled Chosen-Ciphertext Attacks on Kyber.- Post-Quantum Cryptography.- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.- Public Key Encryption and Protocols.- Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain.- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.- Cryptographic Constructions.- Exipnos: An E cient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation.- Blockchains.- On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal Circuit Assumptions.- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?).