000 | 04499nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-44469-2 | ||
003 | DE-He213 | ||
005 | 20240730200831.0 | ||
007 | cr nn 008mamaa | ||
008 | 230925s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031444692 _9978-3-031-44469-2 |
||
024 | 7 |
_a10.1007/978-3-031-44469-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology - LATINCRYPT 2023 _h[electronic resource] : _b8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings / _cedited by Abdelrahaman Aly, Mehdi Tibouchi. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 398 p. 152 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14168 |
|
505 | 0 | _aSymmetric-Key Cryptography -- On the Algebraic Immunity of Weightwise Perfectly Balanced Functions -- ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for High-order Avalanche Tests -- Multi-Party Computation -- On Fully-Secure Honest Majority MPC without nˆ2 Round Overhead -- Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation -- Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels -- Isogeny-Based Cryptography -- Effective Pairings in Isogeny-based Cryptography -- Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields -- Towards a Quantum-resistant Weak Verifiable Delay Function -- Discrete Logarithm Problem -- Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable -- On the Discrete Logarithm Problem in the Ideal Class Group of Multiquadratic Fields -- Cryptographic Protocols -- Stronger Lower Bounds for Leakage-Resilient Secret Sharing -- Folding Schemes with Selective Verification -- Composable Oblivious Pseudo-Random Functions via Garbled Circuits -- Real-World Cryptography -- Quotable Signatures for Authenticating Shared Quotes -- Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments -- Zero-Knowledge Proofs -- Physical Zero-Knowledge Proofs for Five Cells -- Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup -- Set (Non-)Membership NIZKs from Determinantal Accumulators -- Benchmarking the Setup of Updatable zk-SNARKs. | |
520 | _aThis book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aApplication software. _9165029 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aCoding and Information Theory. _9165030 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9165031 |
650 | 2 | 4 |
_aComputer Communication Networks. _9165032 |
700 | 1 |
_aAly, Abdelrahaman. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9165033 |
|
700 | 1 |
_aTibouchi, Mehdi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9165034 |
|
710 | 2 |
_aSpringerLink (Online service) _9165035 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031444685 |
776 | 0 | 8 |
_iPrinted edition: _z9783031444708 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14168 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-44469-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96258 _d96258 |