1  20
Next
 International Workshop on Practice and Theory in Public Key Cryptography (26th : 2023 : Atlanta, Ga.)
 Cham : Springer, 2023.
 Description
 Book — 1 online resource (xvii, 697 pages) : illustrations (some color).
 Summary

 PostQuantum Cryptography
 Attacks
 Signatures
 Isogenies
 Crypto for Crypto
 Pairings
 Key Exchange and Messaging
 Homomorphic Cryptography and Other Topics
 MPC
 Encryption
 IO and ZK.
 International Workshop on Practice and Theory in Public Key Cryptography (22nd : 2019 : Beijing, China)
 Cham, Switzerland : Springer, 2019.
 Description
 Book — 1 online resource (xvii, 614 pages) : illustrations (some color)
 Summary

 [I]. Cryptographic protocols: 1. Sublogarithmic distributed oblivious RAM with small block size / Eyal Kushilevitz and Tamer Mour
 2. Lossy algebraic filters with short tags / Benoît Libert and Chen Qian
 3. Noninteractive keyedverification anonymous credentials / Geoffroy Couteau and Michael Reichle.
 [II]. Digital signatures: 4. Shorter ring signatures from standard assumptions / Alonso González
 5. Efficient attributebased signatures for unbounded arithmetic branching programs / Pratish Datta, Tatsuaki Okamoto, and Katsuyuki Takashima
 6. Efficient invisible and unlinkable sanitizable signatures / Xavier Bultel, Pascal Lafourcade, Russell W.F. Lai, Giulio Malavolta, Dominique Schröder, and Sri Aravinda Krishnan Thyagarajan
 7. Group signatures with selective linkability / Lydia Garms and Anja Lehmann
 8. Let a nonbarking watchdog bite : cliptographic signatures with an offline watchdog / Sherman S.M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, and HongSheng Zhou.
 [III]. Zeroknowledge: 9. Zeroknowledge elementary databases with more expressive queries / Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, and Huaxiong Wang
 10. Efficient noninteractive zeroknowledge proofs in crossdomains without trusted setup / Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, and Ivan Pryvalov
 11. Shorter quadratic QANIZK proofs / Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, and Javier Silva
 12. Short discrete log proofs for FHE and ringLWE ciphertexts / Rafael del Pino, Vadim Lyubashevsky, and Gregor Seiler
 13. Publicly verifiable proofs from blockchains / Alessandra Scafuro, Luisa Siniscalchi, and Ivan Visconti.
 [IV]. Identitybased encryption: 14. Identitybased broadcast encryption with efficient revocation / Aijun Ge and Puwen Wei
 15. Tightly secure hierarchical identitybased encryption / Roman Langrehr and Jiaxin Pan
 16. Leakageresilient identitybased encryption in bounded retrieval model with nearly optimal leakageratio / Ryo Nishimaki and Takashi Yamakawa
 17. Additively homomorphic IBE from higher residuosity / Michael Clear and Ciaran McGoldrick.
 [V]. Fundamental primitives (I): 18. Upper and lower bounds for continuous nonmalleable codes / Dana DachmanSoled and Mukul Kulkarni
 19. Improved security evaluation techniques for imperfect randomness from arbitrary distributions / Takahiro Matsuda, Kenta Takahashi, Takao Murakami, and Goichiro Hanaoka
 20. On tightly secure primitives in the multiinstance setting / Dennis Hofheinz and Ngoc Khanh Nguyen.
 International Workshop on Practice and Theory in Public Key Cryptography (22nd : 2019 : Beijing, China)
 Cham, Switzerland : Springer, 2019.
 Description
 Book — 1 online resource (xviii, 680 pages) : illustrations (some color) Digital: data file.
 Summary

 [I]. Public key encryptions: Collusion resistant broadcast and trace from positional witness encryption / Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
 Breakglass encryption / Alessasndra Scafuro
 Registrationbased encryption from standard assumptions / Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar.
 [II]. Functional encryption: FE for inner products and its application to decentralized ABE / Zhedong Wang, Xiong Fan, FengHao Liu
 Decentralizing innerproduct functional encryption / Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner
 Nonzero inner product encryption schemes from various assumptions : LWE, DDH and DCR / Shuichi Katsumata, Shota Yamada
 Function private predicate encryption for low minentropy predicates / Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna.
 [III]. Obfuscation based cryptography: Adaptively singlekey secure constrained PRFs for NC1 / Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
 Obfuscating simple functionalities from knowledge assumptions / Ward Beullens, Hoeteck Wee.
 [IV]. Reencryption schemes: What about Bob? The inadequacy of CPA security for proxy reencryption / Aloni Cohen
 Adaptively secure proxy reencryption / Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak.
 [V]. Fundamental primitives (II): Generic constructions of robustly reusable fuzzy extractor / Yunhua Wen, Shengli Liu, Dawu Gu
 Safety in numbers : on the need for robust DiffieHellman parameter validation / Steven Galbraith, Jake Massimo, Kenneth G. Paterson
 Hunting and gathering : verifiable random functions from standard assumptions with short proofs / Lisa Kohl.
 [VI]. Post quantum cryptography: Latticebased revocable (hierarchical) IBE with decryption key exposure resistance / Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
 Towards noninteractive zeroknowledge for NP from LWE / Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
 More efficient algorithms for the NTRU key generation using the field norm / Thomas Pornin, Thomas Prest
 Efficiently masking binomial sampling at arbitrary orders for latticebased crypto / Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
 Decryption failure attacks on INDCCA secure latticebased schemes / JanPieter D'Anvers, Qian Guo, Thomas Johnasson, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede
 Reducing the key size of McEliece cryptosystem from automorphisminduced Goppa codes via permutations / Zhe Li, Chaoping Xing, Sze Ling Yeo
 Key encapsulation mechanism with explicit rejection in the quantum random oracle model / Haodong Jiang, Zhenfeng Zhang, Zhi Ma
 Factoring products of braids via Garside normal form / SimonPhilipp Merz, Christophe Petit.
(source: Nielsen Book Data)
 International Workshop on Practice and Theory in Public Key Cryptography (21st : 2018 : Rio de Janeiro, Brazil)
 Cham : Springer, 2018.
 Description
 Book — 1 online resource (xix, 714 pages) : illustrations Digital: text file.PDF.
 Summary

 KeyDependentMessage and SelectiveOpening Security. Searchable and Fully Homomorphic Encryption. PublicKey Encryption. Encryption with Bad Randomness. Subversion Resistance. Cryptanalysis. Composable Security. Oblivious Transfer. Multiparty Computation. Signatures. StructurePreserving Signatures. Functional Encryption. Foundations. ObfuscationBased Cryptographic Constructions. Protocols. Blockchain. ZeroKnowledge. Lattices.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 International Workshop on Practice and Theory in Public Key Cryptography (19th : 2016 : Taipei, Taiwan)
 Berlin : Springer, 2016.
 Description
 Book — 1 online resource (xiv, 472 pages) : illustrations Digital: text file.PDF.
 Summary

 Trading PlaintextAwareness for Simulatability to Achieve Chosen Cipher Text Security
 ChosenCipher Text Security from Subset Sum
 msofareastthemefont: minorlatin; msohansithemefont:minorlatin; msobidifontfamily:CMR10; msoansilanguage:ENUS; msofareastlanguage:ENUS; msobidilanguage:ARSA">On the Hardness of Proving CCASecurity of Signed ElGamal
 CASecure KeyedFully Homomorphic Encryption
 On the Key Dependent Message Security of the FujisakiOkamoto Constructions
 Extended Nested Dual System Groups, Revisited
 Functional Encryption for Inner Product with Full Function Privacy
 Deniable Functional Encryption
 IdentityBased Cryptosystems and Quadratic Residuosity
 Identitybased Hierarchical Keyinsulated Encryption without Random Oracles
 AttributeBased Signatures for Circuits from Bilinear Map
 Efficient Unlinkable Sanitizable Signatures from Signatures with ReRandomizable Keys
 FaultTolerant Aggregate Signatures
 Delegatable Functional Signatures
 Mitigating MultiTarget Attacks in Hashbased Signatures
 Nearly Optimal Verifiable Data Streaming
 ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM.
 International Workshop on Practice and Theory in Public Key Cryptography (19th : 2016 : Taipei, Taiwan)
 Berlin : Springer, 2016.
 Description
 Book — 1 online resource (xiv, 464 pages) : color illustrations Digital: text file.PDF.
 Summary

The twovolume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in PublicKey Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identitybased encryption, signatures, cryptanalysis, leakageresilient and circularly secure encryption, protocols, and primitives.
 International Workshop on Practice and Theory in PublicKey Cryptography (18th : 2015 : Gaithersburg, Md.)
 Heidelberg : Springer, 2015.
 Description
 Book — 1 online resource (xiv, 824 pages) : illustrations
 Summary

 PublicKey Encryption
 SimulationBased Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
 On the Selective Opening Security of Practical PublicKey Encryption Schemes
 How Secure is Deterministic Encryption?
 ECash
 Divisible ECash Made Practical
 Anonymous Transferable ECash
 Cryptanalysis
 Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem
 A PolynomialTime KeyRecovery Attack on MQQ Cryptosystems
 A PolynomialTime Attack on the BBCRS Scheme
 Algebraic Cryptanalysis of a Quantum Money Scheme: The NoiseFree Case
 Digital Signatures
 Digital Signatures from Strong RSA without Prime Generation
 Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions
 TightlySecure Signatures from Chameleon Hash Functions
 PasswordBased Authentication
 TwoServer PasswordAuthenticated Secret Sharing UCSecure Against Transient Corruptions
 Adaptive Witness Encryption and Asymmetric PasswordBased Cryptography
 PublicKey Encryption Indistinguishable Under PlaintextCheckable Attacks
 PairingBased Cryptography
 StronglyOptimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
 A Profitable Subprime Loan: Obtaining the Advantages of Composite Order in PrimeOrder Bilinear Groups
 Digital Signatures
 Simpler Efficient Group Signatures from Lattices
 Group Signatures from Lattices: Simpler, Tighter, Shorter, RingBased
 Secure Efficient HistoryHiding AppendOnly Signatures in the Standard Model
 Efficient Constructions
 OneRound Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
 Additively Homomorphic UC Commitments with Optimal Amortized Overhead
 Interactive MessageLocked Encryption and Secure Deduplication
 Faster ECC over F2521_1
 Cryptography with Imperfect Keys
 Continuous Nonmalleable Key Derivation and Its Application to RelatedKey Security
 A Tamper and Leakage Resilient von Neumann Architecture
 Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
 Interactive Proofs
 Adaptive Proofs of Knowledge in the Random Oracle Model
 Making SigmaProtocols Noninteractive Without Random Oracles
 LatticeBased Cryptography
 Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
 Packing Messages and Optimizing Bootstrapping in GSWFHE
 Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
 IdentityBased, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products
 Predicate Encryption for MultiDimensional Range Queries from Lattices
 On the Practical Security of Inner Product Functional Encryption
 IdentityBased Encryption with (almost) Tight Security in the Multiinstance, Multiciphertext Setting.
 International Workshop on Practice and Theory in Public Key Cryptography (14th : 2011 : Taormina, Italy)
 Heidelberg ; New York : Springer, ©2011.
 Description
 Book — 1 online resource (xiii, 493 pages) : illustrations
 Summary

 Machine generated contents note: Signatures I
 Linearly Homomorphic Signatures over Binary Fields and New Tools for LatticeBased Signatures / David Mandell Freeman
 Homomorphic Network Coding Signatures in the Standard Model / Benoit Libert
 Efficient AttributeBased Signatures for Nonmonotone Predicates in the Standard Model / Katsuyuki Takashima
 Attribute Based Encryption
 CiphertextPolicy AttributeBased Encryption: An Expressive, Efficient, and Provably Secure Realization / Brent Waters
 Generic Constructions for ChosenCiphertext Secure Attribute Based Encryption / Noboru Kunihiro
 Expressive KeyPolicy AttributeBased Encryption with ConstantSize Ciphertexts / Elie de Panafieu
 Number Theory
 Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three / Clemens Heuberger
 On the Correct Use of the Negation Map in the Pollard rho Method / Peter Schwabe  ^ Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 / Mehdi Tibouchi
 Protocols
 (If) Size Matters: SizeHiding Private Set Intersection / Gene Tsudik
 Sublinear, Secure Comparison with Two Noncolluding Parties / Tomas Toft
 Oblivious Transfer with Hidden Access Control Policies / Gregory M. Zaverucha
 ChosenCiphertext Security
 Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited / Dingding Jia
 Chameleon AllButOne TDFs and Their Application to ChosenCiphertext Security / Shengli Liu
 Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks / Kanta Matsuura
 Secure Blind Decryption / Matthew Green
 Invited Talk
 New Developments in LeakageResilient Cryptography (Abstract) / Vinod Vaikuntanathan
 Encryption
 On the Security of a Bidirectional Proxy Reencryption Scheme from PKC 2010 / Goichiro Hanaoka  ^
 Note continued: OnePass HMQV and Asymmetric KeyWrapping / Hugo Krawczyk
 Signatures II
 Linear Recurring Sequences for the UOV Key Generation / Johannes Buchmann
 On the Impossibility of Instantiating PSS in the Standard Model / Avradip Mandal
 Online Nontransferable Signatures Revisited / Kanta Matsuura
 ZeroKnowledge
 RoundEfficient Sublinear ZeroKnowledge Arguments for Linear Algebra / Jae Hong Seo
 Signatures on Randomizable Ciphertexts / Damien Vergnaud
 Revocation for Delegatable Anonymous Credentials / Lan Nguyen
 Cryptanalysis
 Cryptanalysis of Multivariate and OddCharacteristic HFE Variants / Ludovic Ferret
 Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials / JeanGabriel Kammerer
 Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem / Ludovic Ferret.
 Providence, R.I. : American Mathematical Society, c2005.
 Description
 Book — vii, 183 p. : ill. ; 27 cm.
 Summary

 Cryptographic primitives by P. Garrett Cryptography in the real world today by D. Lieman Publickey cryptography and proofs of security by N. HowgraveGraham Elliptic curves and cryptography by J. H. Silverman Towards faster cryptosystems I by W. Whyte Towards faster cryptosystems, II by W. D. Banks Playing "hideandseek" with numbers: The hidden number problem, lattices and exponential sums by I. E. Shparlinski Index.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
Science Library (Li and Ma)
Science Library (Li and Ma)  Status 

Stacks  
QA1 .S95 V.62  Unknown 
 International Workshop for Applied PKI (4th : 2005 September 2123 : Singapore)
 Amsterdam ; Washington, DC : IOS Press, c2005.
 Description
 Book — x, 265 p. : ill. ; 25 cm.
 Summary

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Nonrepudiation, Authorization & Access Control, Authentication & TimeStamping, Certificate Validation & Revocation, and Cryptographic Applications.
(source: Nielsen Book Data)
 Online
SAL3 (offcampus storage)
SAL3 (offcampus storage)  Status 

Stacks  Request (opens in new tab) 
QA76.9 .A25 I557 2005  Available 
 Reprint 2011  Berlin ; Boston : De Gruyter, [2011]
 Description
 Book — 1 online resource (343 p). Digital: text file; PDF.
 Summary

 Frontmatter
 Preface
 Mathematics, cryptology, and technology / Odlyzko, Andrew
 Table of contents
 A survey on IQ cryptography / Buchmann, Johannes / Hamdy, Safuat
 Algebraic groups and discrete logarithm / Couveignes, JeanMarc
 Fermat numbers, Wieferich and Wilson primes: computations and generalizations / Dilcher, Karl / Enge, Andreas
 How to distinguish hyperelliptic curves in even characteristic / Enge, Andreas
 Limitations of constructive Weil descent / Galbraith, Steven D.
 On the security of a publickey cryptosystem / Grošek, Otokar / Magliveras, Spyros S. / Wei, Wandi
 Optimizations for NTRU / Hoffstein, Jeffrey / Silverman, Joseph
 The efficiency and security of a real quadratic field based key exchange protocol / Jacobson, Michael J. / Scheidler, Renate / Williams, Hugh C.
 Extending the binary gcd algorithms / Kubiak, Przemysław
 Stochastic kleptography detection / Kucner, Daniel / Kutylowski, Miroslaw
 An overview of the XTR public key system / Lenstra, Arjen K. / Verheul, Eric R.
 A survey of INDCCA secure publickey encryption schemes relative to factoring / Müller, Siguna
 Efficient point multiplication for elliptic curves over special optimal extension fields / Müller, Volker
 Errorcorrecting codes and cryptography / Niederreiter, Harald
 Secret public key schemes / Patarin, Jacques
 Index form surfaces and construction of elliptic curves over large finite fields / Pethő, Attila
 On the size of solutions of the inequality φ(ax + b) < φ(ax) / Riele, Herman te
 Security of DLencryption and signatures against generic attacksa survey / Schnorr, Claus Peter
 Squareroot algorithms for the discrete logarithm problem (a survey) / Teske, Edlyn
 Height functions on elliptic curves / Zimmer, Horst G.
 List of participants
 List of contributors
(source: Nielsen Book Data)
 International Workshop on Practice and Theory in Public Key Cryptography (25th : 2022 : Online)
 Cham, Switzerland : Springer, 2022.
 Description
 Book — 1 online resource (xiv, 648 pages) : illustrations (some color).
 Summary

 Cryptanalysis
 Multitarget decryption failure attacks and their application to Saber and Kyber
 Postquantum Security of Plain OAEP Transform
 On the security of OSIDH
 TimeMemory tradeoffs for largeweight syndrome decoding in ternary codes
 Syndrome Decoding Estimator
 On the Isogeny Problem with Torsion Point Information
 MPC and Secret Sharing
 Reusable TwoRound MPC from LPN
 On the Bottleneck Complexity of MPC with Correlated Randomness
 LowCommunication Multiparty Triple Generation for SPDZ from RingLPN
 Fast Batched DPSS and its Applications
 CNFFSS and its Applications
 Cryptographic Protocols
 Effcient Verifiable PartiallyDecryptable Commitments from Lattices and Applications
 Making Private Function Evaluation Safer, Faster, and Simpler
 TwoRound Oblivious Linear Evaluation from Learning with Errors
 Improved Constructions of Anonymous Credentials From StructurePreserving Signatures on Equivalence Classes
 Traceable PRFs: Full Collusion Resistance and Active Security
 Tools
 Radical Isogenies on Montgomery Curves
 Towards a Simpler Lattice Gadget Toolkit
 SNARKs and NIZKs
 Polynomial IOPs for Linear Algebra Relations
 A Unified Framework for NonUniversal SNARKs
 ECLIPSE: Enhanced Compiling method for Pedersencommitted zkSNARK Engines
 Rational Modular Encoding in the DCR Setting: NonInteractive Range Proofs and PaillierBased NaorYung in the Standard Model. .
 International Workshop on Practice and Theory in Public Key Cryptography (25th : 2022 : Online)
 Cham : Springer, 2022.
 Description
 Book — 1 online resource (xiv, 530 pages) : illustrations (some color).
 Summary

 Key Exchange
 Postquantum Asynchronous Deniable Key Exchange and the Signal Handshake
 PostQuantum Anonymous OneSided Authenticated Key Exchange without Random Oracles
 Theory
 Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
 Financially Backed Covert Security
 Lifting Standard Model Reductions to Common Setup Assumptions
 Encryption
 Efficient LatticeBased InnerProduct Functional Encryption
 The Direction of Updatable Encryption Does Matter
 LeakageResilient IBE/ABE with Optimal Leakage Rates from Lattices
 Encapsulated Search Index : PublicKey, Sublinear, Distributed, and Delegatable
 KDM Security for the FujisakiOkamoto Transformations in the QROM
 A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
 Signatures
 Latticebased Signatures with Tight Adaptive Corruptions and More
 Count Me In! Extendablity for Threshold Ring Signatures
 A Note on the PostQuantum Security of (Ring) Signatures
 LogarithmicSize (Linkable) Threshold Ring Signatures in the Plain Model
 On PairingFree Blind Signature Schemes in the Algebraic Group Model
 Efficient LatticeBased Blind Signatures via Gaussian OneTime Signatures.
 International Workshop on Practice and Theory in Public Key Cryptography (24th : 2021 : Online)
 Cham, Switzerland : Springer, [2021]
 Description
 Book — 1 online resource (xvii, 756 pages) : illustrations (some color)
 Summary

 PostQuantum Constructions and Cryptanalysis
 QCCASecure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
 An Alternative Approach for SIDH Arithmetic
 The Convergence of Slidetype Reductions
 On the Success Probability of Solving Unique SVP via BKZ
 Tworound noutofn and MultiSignatures and Trapdoor Commitment from Lattice
 Isogenybased key compression without pairings
 Analysis of Multivariate Encryption Schemes: Application to Dob
 On the Integer Polynomial Learning with Errors Problem
 Shorter LatticeBased ZeroKnowledge Proofs via OneTime Commitments
 Multivariate Public Key Cryptosystem from Sidon Spaces
 Banquet: Short and Fast Signatures from AES
 Cryptographic Primitives and Schemes
 Improving Revocation for Group Signature with Redactable Signature
 Bootstrapping fully homomorphic encryption over the integers in less than one second
 Group Signatures with UserControlled and Sequential Linkability
 Impossibility on TamperResilient Cryptography with Uniqueness Properties
 Rate1 KeyDependent Message Security via Reusable Homomorphic Extractor against CorrelatedSource Attacks
 TwoParty Adaptor Signatures From Identification Schemes
 Compact ZeroKnowledge Proofs for Threshold ECDSA with Trustless Setup
 Universal Proxy ReEncryption
 MasterKey KDMSecure ABE via Predicate Encoding
 Exact Lattice Sampling from NonGaussian Distributions
 Efficient AdaptivelySecure IBKEMs and VRFs via NearCollision Resistance
 SubversionResilient Public Key Encryption with Practical Watchdogs
 NonInteractive CCA2Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
 Updatable Signatures and Message Authentication Codes
 MultiClient Functional Encryption for Separable Functions.
 International Workshop on Practice and Theory in Public Key Cryptography (24th : 2021 : Online)
 Cham, Switzerland : Springer, [2021]
 Description
 Book — 1 online resource (xix, 762 pages) : illustrations (some color)
 Summary

 Cryptographic Primitives and Schemes
 More Efficient Digital Signatures with Tight MultiUser Security
 Multiparty Cardinality Testing for Threshold Private Set Intersection
 Verifiable Random Functions with Optimal Tightness
 A Geometric Approach to Homomorphic Secret Sharing
 Generic Negation of Pair Encodings
 On SelectiveOpening Security of Deterministic Primitives
 Revisiting (R)CCA Security and Replay Protection
 Cryptographic Protocols
 SingletoMultiTheorem Transformations for NonInteractive Statistical ZeroKnowledge
 On the CCA Compatibility of PublicKey Infrastructure
 Roundoptimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices
 BETA: BiometricEnabled Threshold Authentication
 Masked Triples: Amortizing Multiplication Triples across Conditionals
 MultiParty Threshold Private Set Intersection with Sublinear Communication
 On the (In)Security of the Di eHellman Oblivious PRF with Multiplicative Blinding
 An Efficient and Generic Construction for Signal's Handshake (X3DH): PostQuantum, State Leakage Secure, and Deniable
 Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
 Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
 Twoserver Distributed ORAM with Sublinear Computation and Constant Rounds
 Flexible and Efficient Verifiable Computation on Encrypted Data
 Transferable Ecash: A Cleaner Model and the First Practical Instantiation
 Private Set Operations from Oblivious Switching
 On PubliclyAccountable ZeroKnowledge and Small Shuffle Arguments
 Beyond Security and E ciency: OnDemand Ratcheting with Security Awareness
 Group Encryption: Full Dynamicity, Message Filtering and CodeBased Instantiation
 Steel: Composable Hardwarebased Stateful and Randomised Functional Encryption
 Attacks and Cryptanalysis
 Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions.
 International Workshop on Practice and Theory in Public Key Cryptography (20th : 2017 : Amsterdam, Netherlands)
 Berlin, Germany : Springer, 2017.
 Description
 Book — 1 online resource (xiv, 466 pages) : illustrations Digital: text file.PDF.
 Summary

 Cryptanalysis, Protocols. Encrpytion Schemes. LeakageResilient and NonMalleable Codes. Number Theory and DieHellman. Encryption with Access Control. Special Signatures. Fully Homomorphic Encryption. RealWorld Schemes. Multiparty Computation. Primitives.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 International Workshop on Practice and Theory in Public Key Cryptography (20th : 2017 : Amsterdam, Netherlands)
 Berlin, Germany : Springer, 2017.
 Description
 Book — 1 online resource (xiv, 556 pages) : illustrations Digital: text file.PDF.
 Summary

 Cryptanalysis, Protocols. Encrpytion Schemes. LeakageResilient and NonMalleable Codes. Number Theory and DieHellman. Encryption with Access Control. Special Signatures. Fully Homomorphic Encryption. RealWorld Schemes. Multiparty Computation. Primitives.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 Cham, Switzerland : Springer, [2019]
 Description
 Book — 1 online resource Digital: text file.PDF.
 Summary

 Quantum Resistant Public Key Encryption Scheme HermitianRLCE. LEDAcrypt: QCLDPC codebased cryptosystems with bounded decryption failure rate. Introducing arithmetic failures to accelerate QCMDPC codebased cryptography. DAGS: Reloaded Revisiting Dyadic Key Encapsulation. Practical Algebraic Attack on DAGS. Weak Keys in the FaureLoidreau Cryptosystem. Analysis of reaction and timing attacks against cryptosystems based on sparse paritycheck codes. On INDCCA1 Security of Randomized McEliece Encryption in the Standard Model.
 (source: Nielsen Book Data)
(source: Nielsen Book Data)
 International Workshop on Practice and Theory in Public Key Cryptography (11th : 2008 : Barcelona, Spain)
 Berlin : SpringerLink, 2008.
 Description
 Book
Articles+
Journal articles, ebooks, & other eresources
Guides
Course and topicbased guides to collections, tools, and services.