000 | 03841nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-35199-1 | ||
003 | DE-He213 | ||
005 | 20240730165612.0 | ||
007 | cr nn 008mamaa | ||
008 | 191116s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030351991 _9978-3-030-35199-1 |
||
024 | 7 |
_a10.1007/978-3-030-35199-1 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aCryptography and Coding _h[electronic resource] : _b17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings / _cedited by Martin Albrecht. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aVIII, 367 p. 659 illus., 20 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11929 |
|
505 | 0 | _aA Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol. | |
520 | _aThis book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _989772 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _989773 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _989774 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aAlbrecht, Martin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989775 |
|
710 | 2 |
_aSpringerLink (Online service) _989776 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030351984 |
776 | 0 | 8 |
_iPrinted edition: _z9783030352004 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11929 _989777 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-35199-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86422 _d86422 |