E-Book, Englisch, Band 14064, 518 Seiten, eBook
14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19–21, 2023, Proceedings
E-Book, Englisch, Band 14064, 518 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-37679-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Post-quantum cryptography.- MinRank in the Head: Short Signatures from Zero-Knowledge Proofs.- Take your MEDS: Digital Signatures from Matrix Code Equivalence.- Efficient computation of (3^n,3^n)-isogenies.- On the Post-Quantum Security of Classical Authenticated Encryption Schemes.- A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial.- Symmetric cryptography.- Universal hashing based on field multiplication and (near-)MDS matrices.- Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps.- Poseidon2: A Faster Version of the Poseidon Hash Function.- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers.- Cryptanalysis.- The special case of cyclotomic fields in quantum algorithms for unit groups.- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.- Blockchain.- The curious case of the half-half Bitcoin ECDSA nonces.- Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality.- Lattice-based cryptography.- ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain.- Concrete Security from Worst-Case to Average-Case Lattice Reductions.- Finding and Evaluating Parameters for BGV.- Quantum Search-to-Decision Reduction for the LWE Problem.- Implementations.- Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions.- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7.- Theory.- Impossibilities in Succinct Arguments: Black-box Extraction and More.- Applications of Timed-release Encryption with Implicit Authentication.