Katalog der Deutschen Nationalbibliothek

Neuigkeiten Donnerstag, 11. September 2025: Die Deutsche Nationalbibliothek öffnet wegen eines Beschäftigtentreffens an beiden Standorten erst um 15 Uhr. // Thursday, 11 September 2025: The German National Library will not open until 15:00 due to a staff meeting at both locations.
 
Neuigkeiten Vom 10. September 2025, 13 Uhr, bis 11. September 2025, 22 Uhr, kann es zu Einschränkungen bei der Bereitstellung von Medienwerken kommen. Wir informieren Sie per E-Mail über den aktuellen Stand Ihrer Bestellungen. // From 13:00 on 10 September 2025 until 22:00 on 11 September 2025, there may be restrictions on the provision of media works. We will inform you by email about the current status of your orders.
 
 

Ergebnis der Suche nach: cod="ro"



Treffer 99 von 4410314 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1371529361
Titel Progress in Cryptology - AFRICACRYPT 2025 : 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21–23, 2025, Proceedings / edited by Abderrahmane Nitaj, Svetla Petkova-Nikova, Vincent Rijmen
Person(en) Nitaj, Abderrahmane (Herausgeber)
Nikova, Svetla (Herausgeber)
Rijmen, Vincent (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XXI, 494 p. 56 illus., 44 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-97259-1
Printed edition:: ISBN: 978-3-031-97261-4
Inhalt -- Homomorphic Encryption. -- Convolution-Friendly Image Compression with FHE. -- Leveled Homomorphic Encryption over Composite Groups. -- Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. -- One-Way Homomorphic Encryption: A Composite Group Approach. -- Cryptanalysis of RSA. -- A Novel Partial Key Exposure Attack on Common Prime RSA. -- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. -- A New Generalized Attack on RSA-like Cryptosystems. -- Cryptography Arithmetic. -- An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. -- PMNS arithmetic for elliptic curve cryptography. -- Constant-time Integer Arithmetic for SQIsign. -- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment. -- Side-channel Attacks. -- Simple Power Analysis Attack on SQIsign. -- Correlation power analysis of LESS and CROSS. -- TPL: Power Leakage Model Based on Technology Library. -- Designs. -- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing. -- Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. -- Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions. -- Simultaneously simple universal and indifferentiable hashing to elliptic curves. -- Cryptanalysis. -- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. -- Efficient and Optimized Modeling of S-Boxes. -- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography
Persistent Identifier URN: urn:nbn:de:101:1-2507150406575.376799086824
DOI: 10.1007/978-3-031-97260-7
URL https://doi.org/10.1007/978-3-031-97260-7
ISBN/Einband/Preis 978-3-031-97260-7
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 15651
DDC-Notation 005.82 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 99 von 4410314
< < > <


E-Mail-IconAdministration