|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Rongmao Chen , Robert H. Deng , Moti YungPublisher: Springer Verlag, Singapore Imprint: Springer Verlag, Singapore ISBN: 9789819562053ISBN 10: 9819562058 Pages: 604 Publication Date: 04 February 2026 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Post-Quantum Cryptography. .- Further Research on Meet-LWE and Its Application to Weakened Kyber. .- Efficient Implementation of Post-Quantum Signature Algorithms for Next Generation of Blockchains. .- Accelerating NTRU-based Bootstrapping with Block Key Distributions. .- Lattice IBE from Non-spherical Gaussian Sampling with Tight Security. .- Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE. .- An Area-Performance Balanced Hardware Accelerator of NTT for Kyber. .- A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation. .- Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model. .- Speedy Error Reconciliation. .- Functional Encryption. .- A Note on the Simpler Construction to Achieve Dynamic FE via IBE. .- Onion Encryption Revisited: Relations Among Security Notions. .- New Key Combiner Schemes for Multiple Keys. .- Wildcarded Identity-Based Inner Product Encryption Based on SM9. .- Dual-Threshold Verifiable Witness Encryption for Signatures and its Applications. .- Cryptanalysis and Implementations I. .- Improved Quantum Cryptanalysis on Generalized Feistel Structure. .- Algebraic Cryptanalysis on Reduced-round Trivium-LE. .- Automated Periodic Distinguisher Search for AND-RX Ciphers. .- Efficient Reconstruction of S-boxes from Partial Cryptographic Tables via MILP Modeling. .- Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification. .- Arithmetic Autocorrelation of Certain Binary Half-ℓ-sequences. .- Related-Key Rectangle Attacks on Round-Reduced TWINE. .- TwoLayerF: A Two-Layer Framework of PNB-based Key Recovery Attacks on ChaCha. .- Exploring AI-Assisted Cryptanalytic Attacks on Multisets. .- Distributed Quantum Key Recovery Attack on Pseudorandom Functions. .- Cryptanalysis and Implementations II. .- An Area-Efficient Design of ZUC-256 Through Hardware Optimization. .- Revisit Bitslice Implementation of Dummy Shuffling. .- TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation. .- Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset. .- Bit-by-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation. .- Multi-feature Fusion Leakage Abuse Attacks against Dynamic Searchable Symmetric Encryption. .- A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack against Kyber.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||