Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV046325149
    Format: 1 Online-Ressource (viii, 367 Seiten) , 659 Illustrationen, 20 in Farbe
    ISBN: 9783030351991
    Series Statement: Lecture notes in computer science 11929
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-35198-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-35200-4
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Codierungstheorie ; Sicherheitsprotokoll ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948274403602882
    Format: VIII, 367 p. 659 illus., 20 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030351991
    Series Statement: Security and Cryptology ; 11929
    Content: This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
    Note: A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030351984
    Additional Edition: Printed edition: ISBN 9783030352004
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    UID:
    gbv_1686644922
    Format: 1 Online-Ressource(VIII, 367 p. 659 illus., 20 illus. in color.)
    Edition: 1st ed. 2019.
    ISBN: 9783030351991
    Series Statement: Security and Cryptology 11929
    Content: A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol.
    Content: This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
    Additional Edition: ISBN 9783030351984
    Additional Edition: ISBN 9783030352004
    Additional Edition: Erscheint auch als Druck-Ausgabe IMACC (17. : 2019 : Oxford) Cryptography and coding Cham, Switzerland : Springer, 2019 ISBN 9783030351984
    Additional Edition: ISBN 303035198X
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030352004
    Language: English
    Keywords: Kryptologie ; Codierung ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030152000?
Did you mean 9783030035204?
Did you mean 9783030052003?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages