menu
{ "item_title" : "Cryptography and Coding", "item_author" : [" Martin Albrecht "], "item_description" : "A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.- Decryption Algorithm Substitution Attacks.- Subversion-Resistant Simulation (Knowledge) Sound NIZKs.- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2.- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.- Efficient Fully Secure Leakage-Deterring Encryption.- Sharing the LUOV: Threshold Post-Quantum Signatures.- Commodity-Based 2PC for Arithmetic Circuits.- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions.- Forgery Attacks on FlexAE and FlexAEAD.- Key Recovery Attacks on Some Rank Metric Code-based Signatures.- On the Security of Multikey Homomorphic Encryption.- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations.- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data.- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.- Distributing any Elliptic Curve Based Protocol.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/03/035/198/303035198X_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Cryptography and Coding|Martin Albrecht

Cryptography and Coding : 17th Ima International Conference, Imacc 2019, Oxford, Uk, December 16-18, 2019, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.- Decryption Algorithm Substitution Attacks.- Subversion-Resistant Simulation (Knowledge) Sound NIZKs.- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2.- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.- Efficient Fully Secure Leakage-Deterring Encryption.- Sharing the LUOV: Threshold Post-Quantum Signatures.- Commodity-Based 2PC for Arithmetic Circuits.- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions.- Forgery Attacks on FlexAE and FlexAEAD.- Key Recovery Attacks on Some Rank Metric Code-based Signatures.- On the Security of Multikey Homomorphic Encryption.- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations.- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data.- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.- Distributing any Elliptic Curve Based Protocol.

This item is Non-Returnable

Details

  • ISBN-13: 9783030351984
  • ISBN-10: 303035198X
  • Publisher: Springer
  • Publish Date: November 2019
  • Dimensions: 9.21 x 6.14 x 0.78 inches
  • Shipping Weight: 1.16 pounds
  • Page Count: 367

Related Categories

You May Also Like...

    1

BAM Customer Reviews