Cryptology and Network Security : 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings - Mauro Conti

Cryptology and Network Security

20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings

By: Mauro Conti (Editor), Marc Stevens (Editor), Stephan Krenn (Editor)

Paperback | 9 December 2021

At a Glance

Paperback


$166.84

or 4 interest-free payments of $41.71 with

 or 

Aims to ship in 7 to 10 business days

Encryption.- Cross-Domain Attribute-Based Access Control Encryption.- Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.- Partition Oracles from Weak Key Forgeries.- Practical Privacy-Preserving Face Identification based on FunctionHiding Functional Encryption.- The Matrix Reloaded: Multiplication Strategies in FrodoKEM.- Signatures.- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from OR-Proofs.- Effcient Threshold-Optimal ECDSA.- GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme.- Issuer-Hiding Attribute-Based Credentials.- Report and Trace Ring Signatures.- Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability.- Cryptographic Schemes and Protocols.- FO-like Combiners and Hybrid Post-Quantum Cryptography.- Linear-time oblivious permutations for SPDZ.- On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem.- Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model.- Attacks and Counter-Measures.- Countermeasures against Backdoor Attacks towards Malware Detectors.- Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services.- Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions.- How Distance-bounding can Detect Internet Traffc Hijacking.- SoK: Secure Memory Allocation.- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.- Towards Quantum Large-Scale Password Guessing on Real-World Distributions.- Attestation and Verification.- Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.- Attestation Waves: Platform Trust via Remote Power Analysis.- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting.- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs.- THC: Practical and Cost-Effective Verification of Delegated Computation.- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Hackers & Painters - Paul Graham

RRP $47.50

$24.75

48%
OFF
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $159.95

$130.75

18%
OFF
There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Guide to Computer Forensics and Investigations : 7th Edition - Christopher Steuart
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$32.75

51%
OFF
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Mastering Ethereum : Building Smart Contracts and Dapps - Andreas Antonopoulos