Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I / edited by Juan A. Garay.
The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, b...
Saved in:
Full text |
|
Personal Name(s): | Garay, Juan A., editor |
Edition: |
1st edition 2021. |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XVII, 756 pages 93 illustrations, 29 illustrations in color (online resource). |
Note: |
englisch |
ISBN: |
9783030752453 |
DOI: |
10.1007/978-3-030-75245-3 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Security and Cryptology ;
12710 /* Depending on the record driver, $field may either be an array with "name" and "number" keys or a flat string containing only the series name. We should account for both cases to maximize compatibility. */?> Lecture Notes in Computer Science |
Subject (LOC): |
- Post-Quantum Constructions and Cryptanalysis
- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
- An Alternative Approach for SIDH Arithmetic
- The Convergence of Slide-type Reductions
- On the Success Probability of Solving Unique SVP via BKZ
- Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice
- Isogeny-based key compression without pairings
- Analysis of Multivariate Encryption Schemes: Application to Dob
- On the Integer Polynomial Learning with Errors Problem
- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments
- Multivariate Public Key Cryptosystem from Sidon Spaces
- Banquet: Short and Fast Signatures from AES
- Cryptographic Primitives and Schemes
- Improving Revocation for Group Signature with Redactable Signature
- Bootstrapping fully homomorphic encryption over the integers in less than one second
- Group Signatures with User-Controlled and Sequential Linkability
- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
- Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
- Two-Party Adaptor Signatures From Identification Schemes
- Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
- Universal Proxy Re-Encryption
- Master-Key KDM-Secure ABE via Predicate Encoding
- Exact Lattice Sampling from Non-Gaussian Distributions
- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
- Subversion-Resilient Public Key Encryption with Practical Watchdogs
- Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
- Updatable Signatures and Message Authentication Codes
- Multi-Client Functional Encryption for Separable Functions.