Description |
1 online resource (xxiii, 699 pages) : illustrations (some color) |
Series |
Lecture Notes in Computer Science ; 13090 |
|
LNCS Sublibrary: SL4 - Security and cryptology |
|
Lecture notes in computer science ; 13090.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Best Paper Awards: On the Hardness of the NTRU Problem -- A Geometric Approach to Linear Cryptanalysis -- Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm Computation; Public-Key Cryptanalysis: Partial Key Exposure Attack on Short Secret Exponent CRT-RSA -- A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks -- Cryptanalysis of an Oblivious PRF from Supersingular Isogenies; Symmetric-Key Cryptanalysis: A Practical Key-Recovery Attack on 805-Round Trivium -- Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations -- Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials -- Clustering Effect in Simon and Simeck -- New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair -- Convexity of Division Property Transitions: Theory, Algorithms and Compact Models -- Strong and Tight Security Guarantees Against Integral Distinguishers -- Massive Superpoly Recovery with Nested Monomial Predictions -- Quantum Linearization Attacks -- Generic Framework for Key-Guessing Improvements -- On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model -- Redeeming Reset Indifferentiability and Applications to Post-quantum Security -- Franchised Quantum Money -- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP -- Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication -- Tight Adaptive Reprogramming in the QROM -- QCB: Efficient Quantum-Secure Authenticated Encryption |
Summary |
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic |
Bibliography |
Includes author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed December 17, 2021) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Tibouchi, Mehdi, editor
|
|
Wang, Huaxiong, editor
|
|
International Association for Cryptologic Research, issuing body.
|
ISBN |
9783030920623 |
|
3030920623 |
|