Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.

The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections:

Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption.

Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.

1146895958
Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.

The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections:

Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption.

Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.

74.99 In Stock
Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I

Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I

Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I

Selected Areas in Cryptography - SAC 2024: 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I

Paperback

$74.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.

The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections:

Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption.

Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.


Product Details

ISBN-13: 9783031828515
Publisher: Springer Nature Switzerland
Publication date: 03/13/2025
Series: Lecture Notes in Computer Science , #15516
Pages: 312
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

.- Privacy-Preserving Cryptography.
.- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification.
.- Simulation Secure Multi-Input Quadratic Functional Encryption.
.- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples.
.- Multi-Key Homomorphic Encryption with Threshold Re-Encryption.
.- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives.
.- Post-Quantum Cryptography.
.- BUFFing FALCON without Increasing the Signature Size.
.- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks.
.- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications.
.- Attacks on Public-Key Cryptography.
.- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA.
.- Multivariate Blind Signatures Revisited.
.- Post-Quantum Backdoor for Kyber-KEM.
.- Identity-based Encryption.
.- Identity-Based Encryption from Lattices with More Compactness in the Standard Model.
.- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).

From the B&N Reads Blog

Customer Reviews