000 05157nam a22006495i 4500
001 978-3-030-92062-3
003 DE-He213
005 20240423125513.0
007 cr nn 008mamaa
008 211130s2021 sz | s |||| 0|eng d
020 _a9783030920623
_9978-3-030-92062-3
024 7 _a10.1007/978-3-030-92062-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aAdvances in Cryptology – ASIACRYPT 2021
_h[electronic resource] :
_b27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part I /
_cedited by Mehdi Tibouchi, Huaxiong Wang.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXXIII, 699 p. 98 illus., 45 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v13090
505 0 _aOn the Hardness of the NTRU problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation -- Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A formula for disaster: a unified approach to elliptic curve special-point-based attacks -- Cryptanalysis of an oblivious PRF from supersingular isogenies -- A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair -- Convexity of division property transitions: theory, algorithms and compact models -- Strong and Tight Security Guarantees against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework forKey-Guessing Improvements -- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model -- Redeeming Reset Indifferentiability and Applications to Post-Quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight adaptive reprogramming in the QROM -- QCB: Efficient Quantum-secure Authenticated Encryption.
520 _aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptoanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aApplication software.
650 0 _aComputer networks .
650 0 _aData protection.
650 1 4 _aCryptology.
650 2 4 _aData Structures and Information Theory.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
700 1 _aTibouchi, Mehdi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Huaxiong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030920616
776 0 8 _iPrinted edition:
_z9783030920630
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v13090
856 4 0 _uhttps://doi.org/10.1007/978-3-030-92062-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c178655
_d178655