Progress in cryptology - INDOCRYPT 2021 : 22nd international conference on cryptology in India, Jaipur, India, December 12-15, 2021, proceedings [E-Book] / edited by Avishek Adhikari, Ralf Küsters, Bart Preneel
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They we...
Saved in:
Full text |
|
Personal Name(s): | Adhikari, Avishek, editor |
Küsters, Ralf, editor / Preneel, Bart, editor | |
Edition: |
1st edition 2021 |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
1 Online-Ressource (XIX, 634 Seiten) + 130 illustrations, 51 illustrations in color |
Note: |
englisch |
ISBN: |
9783030925185 |
DOI: |
10.1007/978-3-030-92518-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Security and cryptology ;
13143 /* Depending on the record driver, $field may either be an array with "name" and "number" keys or a flat string containing only the series name. We should account for both cases to maximize compatibility. */?> Lecture notes in computer science |
Subject (LOC): |
LEADER | 04591nam a22004695i 4500 | ||
---|---|---|---|
001 | 978-3-030-92518-5 | ||
003 | Springer | ||
008 | 211208s2021 sz | s |||| 0|eng d | ||
020 | |a 9783030925185 | ||
024 | 7 | |a 10.1007/978-3-030-92518-5 |2 doi | |
035 | |a (Sirsi) a861757 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 005.82 |2 23 |
245 | 1 | 0 | |a Progress in cryptology - INDOCRYPT 2021 : |b 22nd international conference on cryptology in India, Jaipur, India, December 12-15, 2021, proceedings |h [E-Book] / |c edited by Avishek Adhikari, Ralf Küsters, Bart Preneel |
250 | |a 1st edition 2021 | ||
264 | 1 | |a Cham : |b Springer, |c 2021 |e (Springer LINK) |f SpringerComputerScience20211220 | |
300 | |a 1 Online-Ressource (XIX, 634 Seiten) + |e 130 illustrations, 51 illustrations in color | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Security and cryptology ; |v 13143 | ||
490 | |a Lecture notes in computer science | ||
500 | |a englisch | ||
505 | 0 | |a Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attack on Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?). | |
520 | |a This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains. | ||
650 | 0 | |a Coding theory. | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Information theory. | |
650 | 0 | |a Software engineering. | |
700 | |a Adhikari, Avishek, |e Herausgeber | ||
700 | |a Küsters, Ralf, |e Herausgeber | ||
700 | |a Preneel, Bart, |e Herausgeber | ||
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-92518-5 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
596 | |a 1 | ||
949 | |a XX(861757.1) |w AUTO |c 1 |i 861757-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 20/12/2021 |x ZB-D |z UNKNOWN |0 NEL |1 ONLINE |2 KONFERENZ |