000 | 04956nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-981-99-7563-1 | ||
003 | DE-He213 | ||
005 | 20240730201655.0 | ||
007 | cr nn 008mamaa | ||
008 | 231030s2023 si | s |||| 0|eng d | ||
020 |
_a9789819975631 _9978-981-99-7563-1 |
||
024 | 7 |
_a10.1007/978-981-99-7563-1 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aCryptology and Network Security _h[electronic resource] : _b22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings / _cedited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2023. |
|
300 |
_aXIX, 590 p. 90 illus., 41 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14342 |
|
505 | 0 | _aSchemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.-A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators. | |
520 | _aThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aApplication software. _9168234 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9168235 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9168236 |
700 | 1 |
_aDeng, Jing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168237 |
|
700 | 1 |
_aKolesnikov, Vladimir. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168238 |
|
700 | 1 |
_aSchwarzmann, Alexander A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168239 |
|
710 | 2 |
_aSpringerLink (Online service) _9168240 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819975624 |
776 | 0 | 8 |
_iPrinted edition: _z9789819975648 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14342 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-7563-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96654 _d96654 |