|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Joan Daemen , Emmanuel ThoméPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032253163ISBN 10: 3032253160 Pages: 519 Publication Date: 03 June 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Applied Cryptography. .- ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420. .- Group Key Progression: Strong Security for Shared Persistent Data. .- Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions. .- Combining Oblivious Pseudorandom Functions. .- Two-Factor Authentication Can Harden Servers Against Offline Password Search. .- Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols. .- At-Compromise Security: The Case for Alert Blindness. .- Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability. .- Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH. .- OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security. .- Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More. .- Device-Bound Anonymous Credentials With(out) Trusted Hardware. .- Updatable Private Set Intersection from Symmetric-Key Techniques. .- Malicious Private Set Union with Two-Sided Output. .- Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters. .- Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange. .- Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||