Advances in Cryptology – CRYPTO 2020 -

Advances in Cryptology – CRYPTO 2020

40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I
Buch | Softcover
XXIII, 870 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-56783-5 (ISBN)
106,99 inkl. MwSt

Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.

The 85 papers presented in the proceedings were carefully reviewed and selected from a total of 371 submissions. They were organized in topical sections as follows:

Part I: Security Models; Symmetric and Real World Cryptography; Hardware Security and Leakage Resilience; Outsourced encryption; Constructions.

Part II: Public Key Cryptanalysis; Lattice Algorithms and Cryptanalysis; Lattice-based and Post Quantum Cryptography; Multi-Party Computation.

Part III: Multi-Party Computation; Secret Sharing; Cryptanalysis; Delay functions; Zero Knowledge. 


Security models.- Handling Adaptive Compromise for Practical Encryption Schemes.- Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.- Indifferentiability for Public Key Cryptosystems.- Quantifying the Security Cost of Migrating Protocols to Practice.- Symmetric and Real World Cryptography.- The Memory-Tightness of Authenticated Encryption.- Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.- The Summation-Truncation Hybrid: Reusing Discarded Bits for Free.- Security Analysis of NIST CTR-DRBG.- Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.- Universally Composable Relaxed Password Authenticated Key Exchange.- Anonymous Tokens with Private Metadata Bit.- Hardware Security and Leakage Resilience.- Random Probing Security: Verification, Composition, Expansion and New Constructions.- Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.- Leakage-Resilient Key Exchange and Two-Seed Extractors.- Outsourced encryption.- Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.- Fast and Secure Updatable Encryption.- Incompressible Encodings.- Constructions.- New Constructions of Hinting PRGs, OWFs with Encryption, and more.- Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.- Collusion Resistant Watermarkable PRFs from Standard Assumptions.- Verifiable Registration-Based Encryption.- New Techniques for Traitor Tracing: Size N^{1/3} and More from Pairings.- Public Key Cryptography.- Functional Encryption for Attribute-Weighted Sums from k-Lin.- Amplifying the Security of Functional Encryption, Unconditionally.- Dynamic Decentralized Functional Encryption.- On Succinct Arguments and Witness Encryption from Groups.- Fully Deniable Interactive Encryption.- Chosen Ciphertext Security from Injective Trapdoor Functions.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXIII, 870 p. 624 illus., 36 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1347 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • Artificial Intelligence • authentication • ciphertexts • Communication • Computer Networks • Computer Science • Computer systems • conference proceedings • cryptography • Data Mining • data privacy • Data Security • electronic document identification systems • Encryption • Engineering • Informatics • Mathematics • Network Protocols • Network Security • Public Key Cryptography • Research • Signal Processing • Software engineering
ISBN-10 3-030-56783-4 / 3030567834
ISBN-13 978-3-030-56783-5 / 9783030567835
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich