Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 

"1138011237"
Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 

74.49 In Stock
Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II

Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II

Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II

Advances in Cryptology - ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II

eBook1st ed. 2020 (1st ed. 2020)

$74.49  $99.00 Save 25% Current price is $74.49, Original price is $99. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 


Product Details

ISBN-13: 9783030648343
Publisher: Springer-Verlag New York, LLC
Publication date: 12/04/2020
Series: Lecture Notes in Computer Science , #12492
Sold by: Barnes & Noble
Format: eBook
File size: 90 MB
Note: This product may take a few minutes to download.

Table of Contents

Public Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.- Unbounded HIBE with Tight Security.- Multi-Client Oblivious RAM with Poly-Logarithmic Communication.- Privacy-Preserving Pattern Matching on Encrypted Data.- Efficient Homomorphic Comparison Methods with Optimal Complexity.- Lattice-Based Cryptography.- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings.- Towards Classical Hardness of Module-LWE: The Linear Rank Case.- Lattice-Based E-Cash, Revisited.- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers.- Isogeny-Based Cryptography.- Cryptographic Group Actions and Applications.- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion.- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.- Radical Isogenies.- Oblivious Pseudorandom Functions from Isogenies.- SiGamal: A supersingular isogeny-based PKE and its application to a PRF.- Quantum Algorithms.- Estimating quantum speedups for lattice sieves.- A Combinatorial Approach to Quantum Random Functions.- Improved Classical and Quantum Algorithms for Subset-Sum.- Security Limitations of Classical-Client Delegated Quantum Computing.- Quantum Circuit Implementations of AES with Fewer Qubits.- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.- Authenticated Key Exchange.- Fuzzy Asymmetric Password-Authenticated Key Exchange.- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.

From the B&N Reads Blog

Customer Reviews