141
Provable and Practical Security [E-Book] : 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings /
142
Information Security and Privacy : 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings [E-Book] /
Table of Contents: ...Cryptographic Foundations -- Symmetric Primitives -- Encryption -- Privacy -- Blockchain - Protocols and Foundations -- Blockchain - Analysis and Attack -- Machine Learning for Privacy -- Machine Learning - Analysis and Attack -- Post Quantum...

Full text 
143
Theory of Cryptography [E-Book] : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III /
Table of Contents: ... to PIR and PSI -- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security -- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption -- Grafting Key Trees: Efficient Key Management for Overlapping Groups...

Full text 
144
Applied Cryptography in Computer and Communications [E-Book] : First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings /
145
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part III /
146
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II /
147
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part IV /
Table of Contents: ... Require a Cryptographic Hash Function? -- Composition with Knowledge Assumptions -- Non-Interactive Batch Arguments for NP from Standard Assumptions -- Targeted Lossy Functions and Applications -- The t-wise Independence of Substitution-Permutation Networks...

Full text 
148
Cyber Security Cryptography and Machine Learning [E-Book] : 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings /
Table of Contents: ... Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic...

Full text 
149
Post-Quantum Cryptography [E-Book] : 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings /
Table of Contents: ...Code-Based Cryptography -- Decoding supercodes of Gabidulin codes and applications to cryptanalysis -- LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action -- Classical and Quantum algorithms for generic Syndrome Decoding problems...

Full text 
150
Selected Areas in Cryptography [E-Book] : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
Table of Contents: ... on GIFT -- Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath -- Boolean Ring Cryptographic Equation Solving -- Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions -- Unintended Features...

Full text 
151
Security of Ubiquitous Computing Systems [E-Book] : Selected Topics /
Table of Contents: ...Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques...

Full text 
152
Innovative Security Solutions for Information Technology and Communications [E-Book] : 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers /
Table of Contents: ...Elementary Attestation of Cryptographically Useful Composite Moduli -- Off -the-Shelf Security Testing Platform for Contactless Systems -- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption -- New...

Full text 
153
Theoretical Aspects of Computing - ICTAC 2021 [E-Book] : 18th International Colloquium, Virtual Event, Nur-Sultan, Kazakhstan, September 8-10, 2021, Proceedings /
Table of Contents: ... Security of Crypto-Currencies with Attack-Defense Trees: Proof of Concept and Future Directions -- Compositional Analysis of Protocol Equivalence in the Applied π-calculus using Quasi-Open Bisimilarity -- Card-based Cryptographic Protocols with a Standard Deck...

Full text 
154
Constructive Side-Channel Analysis and Secure Design [E-Book] : 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings /
155
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I /
156
Protocols, Strands, and Logic [E-Book] : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
Table of Contents: ...Cryptography -- Cryptographic Protocols -- Protocol Analysis -- CPSA -- Cybersecurity -- Formal Methods -- Strand Spaces -- Automated Verification -- Model Finding -- Logic -- Attestation -- Accountability -- Differential Privacy -- Quantum Computing...

Full text 
157
Network and System Security [E-Book] : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings /
Chen, Chao
2021
Table of Contents: ... SDN Network Deployment -- Group Key Exchange Compilers from Generic Key Exchanges -- An architecture for processing a dynamic heterogeneous information network of security intelligence -- The Complexity of Testing Cryptographic Devices on Input Faults -- A...

Full text 
158
Finance 4.0 - Towards a Socio-Ecological Finance System [E-Book] : A Participatory Framework to Promote Sustainability /
159
Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I /
Table of Contents: ... -- On the Integer Polynomial Learning with Errors Problem -- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments -- Multivariate Public Key Cryptosystem from Sidon Spaces -- Banquet: Short and Fast Signatures from AES -- Cryptographic Primitives...

Full text 
160
Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II /
Table of Contents: ...Cryptographic Primitives and Schemes -- More Efficient Digital Signatures with Tight Multi-User Security -- Multiparty Cardinality Testing for Threshold Private Set Intersection -- Verifiable Random Functions with Optimal Tightness -- A Geometric...

Full text