Cryptology and Network Security
Springer International Publishing (Verlag)
978-3-031-20973-4 (ISBN)
The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
Zero-knowledge and MPC.- Efficient NIZK Arguments with Straight-Line Simulation and Extraction.- Updatable NIZKs from Non-Interactive Zaps.- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's.- Public-key Infrastructure.- Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS.- Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use.- Auditable Asymmetric Password Authenticated Public Key Establishment.- (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard.- Attacks and Countermeasures.- Passive Triangulation Attack on ORide.- HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments.- Cryptanalysis and Provable Security.- The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN.- How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh.- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.- Provable Security of HADES Structure.- Cryptographic Protocols.- Practical Single-pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters.- Anonymous Random Allocation and Its Applications.- ACDC: Anonymous Crowdsourcing using Digital Cash.- Blockchain and Payment Systems.- Analyzing Price Deviations in DeFi Oracles.- Redacting Blockchain without Exposing Chameleon Hash Collisions.- Codes and Post-Quantum Cryptography.- Efficient Proofs of Retrievability using Expander Codes.- Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era.
Erscheinungsdatum | 12.11.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 391 p. 70 illus., 17 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 623 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • Artificial Intelligence • authentication • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • electronic document identification systems • Encryption • Informatics • Network Protocols • Network Security • privacy • Public Key Cryptography • Research • sensors • Signal Processing • Telecommunication networks • Telecommunication Systems |
ISBN-10 | 3-031-20973-7 / 3031209737 |
ISBN-13 | 978-3-031-20973-4 / 9783031209734 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich