000 03996nam a22006135i 4500
001 978-3-031-58868-6
003 DE-He213
005 20240730172042.0
007 cr nn 008mamaa
008 240506s2024 sz | s |||| 0|eng d
020 _a9783031588686
_9978-3-031-58868-6
024 7 _a10.1007/978-3-031-58868-6
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aTopics in Cryptology - CT-RSA 2024
_h[electronic resource] :
_bCryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings /
_cedited by Elisabeth Oswald.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aX, 491 p. 61 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14643
505 0 _aA Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private -- The Security of the Full EDHOC Protocol in the Multi-user Setting -- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model -- Automated-based Rebound Attacks on ACE Permutation -- Batch Signatures, Revisited -- History-Free Sequential Aggregation of Hash-and-Sign Signatures -- TFHE Public-Key Encryption Revisited -- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption -- The Exact Multi-User Security of 2-Key Triple DES -- Improved Meet-in-the-Middle Attacks on 9-Round AES-192 -- Identity-Based Encryption from LWE with More Compact Master Public Key -- Towards Compact Identity-based Encryption on Ideal Lattices -- Attribute-Based Signatures with Advanced Delegation, and Tracing -- Lattice-based Threshold, Accountable, and Private Signature -- Ascon MAC, PRF, and Short-Input PRF -- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation -- Parameterization of Fault Adversary Models - Connecting Theory and Practice -- Cutting the GRASS: Threshold GRoup Action Signature Schemes.
520 _aThis book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6-9, 2024. The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aComputer engineering.
_910164
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9101547
650 2 4 _aComputer Engineering and Networks.
_9101548
650 2 4 _aCoding and Information Theory.
_9101549
700 1 _aOswald, Elisabeth.
_eeditor.
_0(orcid)
_10000-0001-7502-3184
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101551
710 2 _aSpringerLink (Online service)
_9101553
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031588679
776 0 8 _iPrinted edition:
_z9783031588693
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14643
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-58868-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c87979
_d87979