Topics in Cryptology ? CT-RSA 2024

Cryptographers? Track at the RSA Conference 2024, San Francisco, CA, USA, May 6?9, 2024, Proceedings
 
Edition number: 2024
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 79.17
Estimated price in HUF:
32 669 HUF (31 113 HUF + 5% VAT)
Why estimated?
 
Your price:

26 135 (24 890 HUF + 5% VAT )
discount is: 20% (approx 6 534 HUF off)
Discount is valid until: 30 June 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
 
 
 
Product details:

ISBN13:9783031588679
ISBN10:3031588673
Binding:Paperback
No. of pages:483 pages
Size:235x155 mm
Language:English
Illustrations: 65 Illustrations, black & white
700
Category:
Long description:

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6?9, 2024.



The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks.

Table of Contents:

A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private.- The Security of the Full EDHOC Protocol in the Multi-user Setting.- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model.- Automated-based Rebound Attacks on ACE Permutation.- Batch Signatures, Revisited.- History-Free Sequential Aggregation of Hash-and-Sign Signatures.- TFHE Public-Key Encryption Revisited.- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption.- The Exact Multi-User Security of 2-Key Triple DES.- Improved Meet-in-the-Middle Attacks on 9-Round AES-192.- Identity-Based Encryption from LWE with More Compact Master Public Key.- Towards Compact Identity-based Encryption on Ideal Lattices.- Attribute-Based Signatures with Advanced Delegation, and Tracing.- Lattice-based Threshold, Accountable, and Private Signature.- Ascon MAC, PRF, and Short-Input PRF.- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation.- Parameterization of Fault Adversary Models - Connecting Theory and Practice.- Cutting the GRASS: Threshold GRoup Action Signature Schemes.