001440832 000__ 04693cam\a2200661\i\4500 001440832 001__ 1440832 001440832 003__ OCoLC 001440832 005__ 20230309004704.0 001440832 006__ m\\\\\o\\d\\\\\\\\ 001440832 007__ cr\cn\nnnunnun 001440832 008__ 211109s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001440832 019__ $$a1292518743 001440832 020__ $$a9783030904531$$q(electronic bk.) 001440832 020__ $$a3030904539$$q(electronic bk.) 001440832 020__ $$z9783030904524$$q(print) 001440832 0247_ $$a10.1007/978-3-030-90453-1$$2doi 001440832 035__ $$aSP(OCoLC)1284916269 001440832 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF$$dOCLCO$$dDKU$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001440832 049__ $$aISEA 001440832 050_4 $$aQA76.9.A25 001440832 08204 $$a005.8/24$$223 001440832 1112_ $$aTheory of Cryptography Conference$$n(19th :$$d2021 :$$cRaleigh, N.C.) 001440832 24510 $$aTheory of cryptography :$$b19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings.$$nPart II /$$cKobbi Nissim, Brent Waters (eds.). 001440832 2463_ $$aTCC 2021 001440832 264_1 $$aCham, Switzerland :$$bSpringer,$$c2021. 001440832 300__ $$a1 online resource (xii, 753 pages) :$$billustrations (some color) 001440832 336__ $$atext$$btxt$$2rdacontent 001440832 337__ $$acomputer$$bc$$2rdamedia 001440832 338__ $$aonline resource$$bcr$$2rdacarrier 001440832 347__ $$atext file 001440832 347__ $$bPDF 001440832 4901_ $$aLecture notes in computer science ;$$v13043 001440832 4901_ $$aLNCS sublibrary, SL 4, Security and cryptology 001440832 500__ $$aIncludes author index. 001440832 5050_ $$aDory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments -- On Communication-E cient Asynchronous MPC with Adaptive Security -- Efficient Perfectly Secure Computation with Optimal Resilience -- On Communication Models and Best-Achievable Security in Two-Round MPC -- Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation -- Blockchains Enable Non-Interactive MPC -- Multi-party PSM, Revisited: Improved Communication and Unbalanced Communication -- Multi-Party Functional Encryption -- Succinct LWE Sampling, Random Polynomials, and Obfuscation -- ABE for DFA from LWE against Bounded Collusions, Revisited -- Distributed Merkle's Puzzles -- Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity -- Disappearing Cryptography in the Bounded Storage Model -- Trojan-Resilience without Cryptography -- On Derandomizing Yao's Weak-to-Strong OWF Construction -- Simple Constructions from (Almost) Regular One-Way Functions -- On Treewidth, Separators and Yao's Garbling -- Oblivious Transfer from Trapdoor Permutations in Minimal Rounds -- The Cost of Adaptivity in Security Games on Graphs -- Concurrent Composition of Differential Privacy -- Direct Product Hardness Amplifcation -- On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger -- BKW Meets Fourier: New Algorithms for LPN with Sparse Parities -- Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy -- Polynomial-time targeted attacks on coin-tossing for any number of corruptions.- 001440832 506__ $$aAccess limited to authorized users. 001440832 520__ $$aThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication. 001440832 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 9, 2021). 001440832 650_0 $$aData encryption (Computer science)$$vCongresses. 001440832 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001440832 650_6 $$aChiffrement (Informatique)$$vCongrès. 001440832 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001440832 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440832 655_7 $$aConference papers and proceedings.$$2lcgft 001440832 655_7 $$aActes de congrès.$$2rvmgf 001440832 655_0 $$aElectronic books. 001440832 7001_ $$aNissim, Kobbi,$$eeditor. 001440832 7001_ $$aWaters, Brent R.,$$d1978-$$eeditor. 001440832 77608 $$iPrint version: $$z9783030904524 001440832 77608 $$iPrint version: $$z9783030904548 001440832 830_0 $$aLecture notes in computer science ;$$v13043. 001440832 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001440832 852__ $$bebk 001440832 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90453-1$$zOnline Access$$91397441.1 001440832 909CO $$ooai:library.usi.edu:1440832$$pGLOBAL_SET 001440832 980__ $$aBIB 001440832 980__ $$aEBOOK 001440832 982__ $$aEbook 001440832 983__ $$aOnline 001440832 994__ $$a92$$bISE