Описание: The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation.Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.
Описание: This text focuses on three related areas in the theory of computation. The areas are modern cryptography, the study of probabilistic proof systems, and the theory of computational pseudorandomness. The common theme is the interplay between randomness and computation.
Описание: Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness.
Описание: Garbled Circuits.- LogStack: Stacked Garbling with O(b log b) Computation.- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.- Threshold Garbled Circuits and Ad Hoc Secure Computation.- Indistinguishability Obfuscation.- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.- Candidate Obfuscation via Oblivious LWE Sampling.- Non-Malleable Commitments.- Black-Box Non-Interactive Non-Malleable Commitments.- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.- Zero-Knowledge Proofs.- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.- Towards Accountability in CRS Generation.- Property-Preserving Hash Functions and ORAM.- Robust Property-Preserving Hash Functions for Hamming Distance and More.- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.- Structured Encryption and Dynamic Leakage Suppression.- Blockchain.- Dynamic Ad Hoc Clock Synchronization.- TARDIS: A Foundation of Time-Lock Puzzles in UC.- Privacy and Law Enforcement.- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy.- Non-Interactive Anonymous Router.- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures.- Abuse Resistant Law Enforcement Access Systems.
Описание: Non-Interactive Zero Knowledge from Sub-exponential DDH.- On the (in)security of ROS.- New Representations of the AES Key Schedule.- Public-Key Cryptography.- Analysing the HPKE Standard.- Tightly-Secure Authenticated Key Exchange, Revisited.- Aggregatable Distributed Key Generation.- Decentralized Multi-Authority ABE for DNFs from LWE.- Isogenies.- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols.- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.- Delay Encryption.- Post-Quantum Cryptography.- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.- Improved cryptanalysis of UOV and Rainbow.- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.- Post-Quantum Multi-Party Computation.- Lattices.- A 2ⁿ/ -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.- On the ideal shortest vector problem over random rational primes.- Homomorphic Encryption.- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function.- On the Security of Homomorphic Encryption on Approximate Numbers.- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT.- Symmetric Cryptanalysis.- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.- Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.- A Deeper Look at Machine Learning-Based Cryptanalysis.
Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Автор: Lilya Budaghyan Название: Construction and Analysis of Cryptographic Functions ISBN: 3319363581 ISBN-13(EAN): 9783319363585 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.
Автор: Razaque Abdul, Amsaad Fathi, Alajlan Abrar Название: Cryptographic Methods ISBN: 1973694093 ISBN-13(EAN): 9781973694090 Издательство: Неизвестно Рейтинг: Цена: 9566.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the significance of those cryptographic algorithms. It is highly useful in conducting the hands of experience. This book is designed for a wide range of individuals who are highly intrigued to improve their knowledge as a cybersecurity professional.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.
Описание: Covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. The book can be used by anyone studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated.
Автор: Wieland Fischer; Naofumi Homma Название: Cryptographic Hardware and Embedded Systems – CHES 2017 ISBN: 3319667866 ISBN-13(EAN): 9783319667867 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.
Автор: Gierlichs Название: Cryptographic Hardware and Embedded Systems – CHES 2016 ISBN: 3662531399 ISBN-13(EAN): 9783662531396 Издательство: Springer Рейтинг: Цена: 11460.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru