000 | 04734nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-37679-5 | ||
003 | DE-He213 | ||
005 | 20240730181347.0 | ||
007 | cr nn 008mamaa | ||
008 | 230712s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031376795 _9978-3-031-37679-5 |
||
024 | 7 |
_a10.1007/978-3-031-37679-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology - AFRICACRYPT 2023 _h[electronic resource] : _b14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings / _cedited by Nadia El Mrabet, Luca De Feo, Sylvain Duquesne. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 518 p. 64 illus., 35 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14064 |
|
505 | 0 | _aPost-quantum cryptography -- MinRank in the Head: Short Signatures from Zero-Knowledge Proofs -- Take your MEDS: Digital Signatures from Matrix Code Equivalence -- Efficient computation of (3^n,3^n)-isogenies -- On the Post-Quantum Security of Classical Authenticated Encryption Schemes -- A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial -- Symmetric cryptography -- Universal hashing based on field multiplication and (near-)MDS matrices -- Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit groups -- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Blockchain -- The curious case of the half-half Bitcoin ECDSA nonces -- MaravedĂ: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality -- Lattice-based cryptography -- ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain -- Concrete Security from Worst-Case to Average-Case Lattice Reductions -- Finding and Evaluating Parameters for BGV -- Quantum Search-to-Decision Reduction for the LWE Problem -- Implementations -- Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions -- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7 -- Theory -- Impossibilities in Succinct Arguments: Black-box Extraction and More -- Applications of Timed-release Encryption with Implicit Authentication. | |
520 | _aThis volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa. The 21 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Post-quantum cryptography; Symmetric cryptography; Cryptanalysis; Blockchain; Lattice-based cryptography; Implementations; Theory. . | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer vision. _9124521 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aMicroprogramming . _932081 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Vision. _9124522 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aControl Structures and Microprogramming. _932083 |
700 | 1 |
_aEl Mrabet, Nadia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124523 |
|
700 | 1 |
_aDe Feo, Luca. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124524 |
|
700 | 1 |
_aDuquesne, Sylvain. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124525 |
|
710 | 2 |
_aSpringerLink (Online service) _9124526 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031376788 |
776 | 0 | 8 |
_iPrinted edition: _z9783031376801 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14064 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-37679-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90850 _d90850 |