|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Abderrahmane Nitaj , Amr YoussefPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 12174 Weight: 0.712kg ISBN: 9783030519377ISBN 10: 3030519376 Pages: 453 Publication Date: 05 July 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsQA-NIZK Arguments of Same Opening for Bilateral Commitments.- Signatures of Knowledge for Boolean Circuits under Standard Assumptions.- LESS is More: Code-Based Signatures without Syndromes.- UC Updatable Databases and Applications.- Symmetric Key Cryptography.- Impossible Di erential Cryptanalysis of Reduced-Round Tweakable TWINE.- MixColumns Coe cient Property and Security of the AES withA Secret S-Box.- New Results on the SymSum Distinguisher on Round-Reduced SHA3.-Cryptanalysis of FlexAEAD.- BBB Secure Nonce Based MAC Using Public Permutations.- Elliptic Curves.- On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol.- A SAT-Based Approach for Index Calculus on Binary Elliptic Curves.- Post Quantum Cryptography.- Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security.- LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4.- Lattice Based Cryptography.- Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression.- Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP.-Side Channel Attacks.- Online Template Attack On ECDSA: Extracting Keys Via The Other Side.- When similarities among devices are taken for granted: Another look at portability.- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF.- Attacking RSA Using an Arbitrary Parameter.- New Algorithms and Schemes.- A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder.- New Ideas to Build Noise-Free Homomorphic Cryptosystems.- Zero Knowledge.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |