Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Machine Learning"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1378042549 |
Titel | Progress in Cryptology – LATINCRYPT 2025 : 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1–3, 2025, Proceedings / edited by Daniel Escudero, Ivan Damgård |
Person(en) |
Escudero, Daniel (Herausgeber) Damgård, Ivan (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2026 |
Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2026 |
Umfang/Format | Online-Ressource, XII, 489 p. 64 illus., 19 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-032-06753-1 Printed edition:: ISBN: 978-3-032-06755-5 |
Inhalt | -- Position Paper. -- Cryptography and Collective Power. -- Zero-Knowledge Proofs and Distributed Computation. -- Post-Quantum Zero-Knowledge with Space-Bounded Simulation. -- Adaptive UC NIZK for Practical Applications. -- Fast elliptic curve scalar multiplications in SN(T)ARK circuits. -- Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR. -- Quantum and Post-Quantum Cryptography. -- Orient Express: Using Frobenius to Express Oriented Isogenies. -- Improved algorithms for ascending isogeny volcanoes, and applications. -- The Tate Profile. -- Extending Regev’s quantum algorithm to elliptic curves. -- The role of piracy in quantum proofs. -- Symmetric-Key Cryptography and Attacks. -- (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration. -- A Simple Forgery Attack on Pelican. -- From at Least $n/3$ to at Most $3\sqrtn}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function. -- Machine Learning and Cryptanalysis. -- Generic Partial Decryption as Feature Engineering for Neural Distinguishers. -- Extracting Some Hidden Layers of Deep Neural Networks in the Hard-Label Setting. -- Implementation and Efficiency. -- Rhizomes and the Roots of Efficiency – Improving Prio. -- Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU |
Persistent Identifier |
URN: urn:nbn:de:101:1-2510020409208.900596388631 DOI: 10.1007/978-3-032-06754-8 |
URL | https://doi.org/10.1007/978-3-032-06754-8 |
ISBN/Einband/Preis | 978-3-032-06754-8 |
Sprache(n) | Englisch (eng) |
Beziehungen | Lecture Notes in Computer Science ; 16129 |
DDC-Notation | 005.82 (maschinell ermittelte DDC-Kurznotation) |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
