Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: cod="ra"



Treffer 50 von 7157708 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1371529361
Titel Progress in Cryptology - AFRICACRYPT 2025 : 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21–23, 2025, Proceedings / edited by Abderrahmane Nitaj, Svetla Petkova-Nikova, Vincent Rijmen
Person(en) Nitaj, Abderrahmane (Herausgeber)
Nikova, Svetla (Herausgeber)
Rijmen, Vincent (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XXI, 494 p. 56 illus., 44 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-97259-1
Printed edition:: ISBN: 978-3-031-97261-4
Inhalt -- Homomorphic Encryption. -- Convolution-Friendly Image Compression with FHE. -- Leveled Homomorphic Encryption over Composite Groups. -- Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. -- One-Way Homomorphic Encryption: A Composite Group Approach. -- Cryptanalysis of RSA. -- A Novel Partial Key Exposure Attack on Common Prime RSA. -- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. -- A New Generalized Attack on RSA-like Cryptosystems. -- Cryptography Arithmetic. -- An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. -- PMNS arithmetic for elliptic curve cryptography. -- Constant-time Integer Arithmetic for SQIsign. -- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment. -- Side-channel Attacks. -- Simple Power Analysis Attack on SQIsign. -- Correlation power analysis of LESS and CROSS. -- TPL: Power Leakage Model Based on Technology Library. -- Designs. -- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing. -- Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. -- Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions. -- Simultaneously simple universal and indifferentiable hashing to elliptic curves. -- Cryptanalysis. -- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. -- Efficient and Optimized Modeling of S-Boxes. -- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography
Persistent Identifier URN: urn:nbn:de:101:1-2507150406575.376799086824
DOI: 10.1007/978-3-031-97260-7
URL https://doi.org/10.1007/978-3-031-97260-7
ISBN/Einband/Preis 978-3-031-97260-7
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 15651
DDC-Notation 005.82 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 50 von 7157708
< < > <


E-Mail-IconAdministration