Progress in Cryptology - AFRICACRYPT 2024 (Record no. 88494)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04602nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-64381-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730172713.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240703s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031643811 |
-- | 978-3-031-64381-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.824 |
245 10 - TITLE STATEMENT | |
Title | Progress in Cryptology - AFRICACRYPT 2024 |
Sub Title | 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XXI, 455 p. 59 illus., 24 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Symmetric Key Cryptography -- On the Double Differential Uniformity of Vectorial Boolean Functions -- TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters -- Best Paper Award -- Quasi-Optimal Permutation Ranking and Applications to PERK -- Advanced Primitives -- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness -- Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs -- Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries -- Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy -- iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption -- Post-quantum Cryptography -- On the Generalizations of the Rank Metric Over Finite Chain Rings -- Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV -- QCCA security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model -- Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber -- Elliptic Curve Cryptography and RSA -- Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves -- Same Values Analysis Attack on Weierstrass Binary Elliptic Curves -- Cryptanalysis of a New Variant of the RSA Cryptosystem -- Lattice-based Cryptography Constructions -- DiTRU: A Resurrection of NTRU over Dihedral Group -- Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption -- Lattice-based Cryptography Cryptanalysis -- Finding Dense Submodules with Algebraic Lattice Reduction -- The Cool and the Cruel: Separating Hard Parts of LWE Secrets. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, held in Douala, Cameroon, in July 2024. The 19 full papers included in this book were carefully reviewed and selected from 35 submissions. They are organized in topical sections as follows: symmetric key cryptography; advanced primitives; post-quantum cryptography; elliptic curve cryptography and RSA; lattice-based cryptography constructions; and lattice-based cryptography cryptanalysis. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Vaudenay, Serge. |
700 1# - AUTHOR 2 | |
Author 2 | Petit, Christophe. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-64381-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer vision. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microprogramming . |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Vision. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Control Structures and Microprogramming. |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0001-9185-1449 |
700 1# - AUTHOR 2 | |
-- | (orcid) |
-- | 0000-0003-3482-6743 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-PRO |
912 ## - | |
-- | ZDB-2-LNC |
No items available.