E-Book, Englisch, Band 13143, 634 Seiten, eBook
Adhikari / Küsters / Preneel Progress in Cryptology – INDOCRYPT 2021
1. Auflage 2021
ISBN: 978-3-030-92518-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings
E-Book, Englisch, Band 13143, 634 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-92518-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Authenticated Encryption.- Revisiting the Security of COMET Authenticated Encryption Scheme.- tHyENA: Making HyENA Even Smaller.- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme.- Symmetric Cryptography.- Crooked Indi?erentiability of Enveloped XOR Revisited.- Sequential Indi?erentiability of Confusion-Di?usion Networks.- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher .- Lightweight Cryptography.- Three Input Exclusive-OR Gate Support For Boyar-Peralta’s Algorithm.- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes.- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover’s Attacks .- Side-Channel Attacks.- Analyzing Masked Ciphers Against Transition and Coupling E?ects.- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks.- Improving First-Order Threshold Implementations of SKINNY .- Fault Attacks.- Di?erential Fault Attackon Espresso.- Di?erential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization.- Fault-Enabled Chosen-Ciphertext Attacks on Kyber. - Post-Quantum Cryptography.- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting.- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.- Public Key Encryption and Protocols.- Identity-Based Matchmaking Encryption without Random Oracles.- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain.- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE .- Cryptographic Constructions.- Exipnos: An E?cient Veri?able Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy.- Smooth Zero-Knowledge Hash Functions.- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation .- Blockchains.- On Elapsed Time Consensus Protocols.- Time-release Cryptography from Minimal Circuit Assumptions.- Succinct Publicly-Certi?able Proofs (or, Can a Blockchain Verify a Designated-Veri?er Proof?).