Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: cod="ra"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1371529361 |
Titel | Progress in Cryptology - AFRICACRYPT 2025 : 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21–23, 2025, Proceedings / edited by Abderrahmane Nitaj, Svetla Petkova-Nikova, Vincent Rijmen |
Person(en) |
Nitaj, Abderrahmane (Herausgeber) Nikova, Svetla (Herausgeber) Rijmen, Vincent (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2026 |
Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2026 |
Umfang/Format | Online-Ressource, XXI, 494 p. 56 illus., 44 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-97259-1 Printed edition:: ISBN: 978-3-031-97261-4 |
Inhalt | -- Homomorphic Encryption. -- Convolution-Friendly Image Compression with FHE. -- Leveled Homomorphic Encryption over Composite Groups. -- Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. -- One-Way Homomorphic Encryption: A Composite Group Approach. -- Cryptanalysis of RSA. -- A Novel Partial Key Exposure Attack on Common Prime RSA. -- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. -- A New Generalized Attack on RSA-like Cryptosystems. -- Cryptography Arithmetic. -- An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. -- PMNS arithmetic for elliptic curve cryptography. -- Constant-time Integer Arithmetic for SQIsign. -- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment. -- Side-channel Attacks. -- Simple Power Analysis Attack on SQIsign. -- Correlation power analysis of LESS and CROSS. -- TPL: Power Leakage Model Based on Technology Library. -- Designs. -- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing. -- Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. -- Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions. -- Simultaneously simple universal and indifferentiable hashing to elliptic curves. -- Cryptanalysis. -- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. -- Efficient and Optimized Modeling of S-Boxes. -- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography |
Persistent Identifier |
URN: urn:nbn:de:101:1-2507150406575.376799086824 DOI: 10.1007/978-3-031-97260-7 |
URL | https://doi.org/10.1007/978-3-031-97260-7 |
ISBN/Einband/Preis | 978-3-031-97260-7 |
Sprache(n) | Englisch (eng) |
Beziehungen | Lecture Notes in Computer Science ; 15651 |
DDC-Notation | 005.82 (maschinell ermittelte DDC-Kurznotation) |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
