Advances in Cryptology – CRYPTO 2020
Springer International Publishing (Verlag)
978-3-030-56783-5 (ISBN)
Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.
The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:
Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.
Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.
Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge.
Security models.- Handling Adaptive Compromise for Practical Encryption Schemes.- Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.- Indifferentiability for Public Key Cryptosystems.- Quantifying the Security Cost of Migrating Protocols to Practice.- Symmetric and Real World Cryptography.- The Memory-Tightness of Authenticated Encryption.- Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.- The Summation-Truncation Hybrid: Reusing Discarded Bits for Free.- Security Analysis of NIST CTR-DRBG.- Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.- Universally Composable Relaxed Password Authenticated Key Exchange.- Anonymous Tokens with Private Metadata Bit.- Hardware Security and Leakage Resilience.- Random Probing Security: Verification, Composition, Expansion and New Constructions.- Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.- Leakage-Resilient Key Exchange and Two-Seed Extractors.- Outsourced encryption.- Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.- Fast and Secure Updatable Encryption.- Incompressible Encodings.- Constructions.- New Constructions of Hinting PRGs, OWFs with Encryption, and more.- Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.- Collusion Resistant Watermarkable PRFs from Standard Assumptions.- Verifiable Registration-Based Encryption.- New Techniques for Traitor Tracing: Size N^{1/3} and More from Pairings.- Public Key Cryptography.- Functional Encryption for Attribute-Weighted Sums from k-Lin.- Amplifying the Security of Functional Encryption, Unconditionally.- Dynamic Decentralized Functional Encryption.- On Succinct Arguments and Witness Encryption from Groups.- Fully Deniable Interactive Encryption.- Chosen Ciphertext Security from Injective Trapdoor Functions.
Erscheinungsdatum | 17.08.2020 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XXIII, 870 p. 624 illus., 36 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1347 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • Artificial Intelligence • authentication • ciphertexts • Communication • Computer Networks • Computer Science • Computer systems • conference proceedings • cryptography • Data Mining • data privacy • Data Security • electronic document identification systems • Encryption • Engineering • Informatics • Mathematics • Network Protocols • Network Security • Public Key Cryptography • Research • Signal Processing • Software engineering |
ISBN-10 | 3-030-56783-4 / 3030567834 |
ISBN-13 | 978-3-030-56783-5 / 9783030567835 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich