001441176 000__ 06150cam\a2200709\i\4500 001441176 001__ 1441176 001441176 003__ OCoLC 001441176 005__ 20230309004724.0 001441176 006__ m\\\\\o\\d\\\\\\\\ 001441176 007__ cr\un\nnnunnun 001441176 008__ 211204t20212021sz\a\\\\o\\\\\101\0\eng\d 001441176 019__ $$a1292518420$$a1294359682 001441176 020__ $$a9783030920753$$q(electronic bk.) 001441176 020__ $$a3030920755$$q(electronic bk.) 001441176 020__ $$z9783030920746 001441176 0247_ $$a10.1007/978-3-030-92075-3$$2doi 001441176 035__ $$aSP(OCoLC)1287138258 001441176 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dGW5XE$$dGZM$$dOCLCF$$dDKU$$dOCLCO$$dDCT$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001441176 049__ $$aISEA 001441176 050_4 $$aQA76.9.D335 001441176 08204 $$a005.8/24$$223 001441176 1112_ $$aInternational Conference on the Theory and Application of Cryptology and Information Security$$n(27th :$$d2021 :$$cOnline) 001441176 24510 $$aAdvances in cryptology -- ASIACRYPT 2021 :$$b27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings.$$nPart II /$$cMehdi Tibouchi, Huaxiong Wang (eds.). 001441176 2463_ $$aASIACRYPT 2021 001441176 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001441176 264_4 $$c©2021 001441176 300__ $$a1 online resource (xvii, 728 pages) :$$b84 black and white illustrations, 39 illustrations in colour 001441176 336__ $$atext$$btxt$$2rdacontent 001441176 337__ $$acomputer$$bc$$2rdamedia 001441176 338__ $$aonline resource$$bcr$$2rdacarrier 001441176 347__ $$atext file 001441176 347__ $$bPDF 001441176 4901_ $$aLecture Notes in Computer Science Ser. ;$$vv. 13091 001441176 4901_ $$aLNCS Sublibrary: SL4 - Security and cryptology 001441176 500__ $$a"Due to the COVID-19 pandemic, it was shifted to an online-only virtual conference." 001441176 500__ $$aIncludes author index. 001441176 5050_ $$aSecure and Efficient Software Masking on Superscalar Pipelined Processors -- Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Cand -- Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks -- Efficient Leakage-Resilient MACs without Idealized Assumptions -- DEFAULT: Cipher Level Resistance Against Differential Fault Attack -- Random Probing Expansion: Quasi Linear Gadgets \ & Dynamic Compilers -- Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials -- Improved single-round secure multiplication using regenerating codes -- Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation -- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation -- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH -- Reverse Firewalls for Adaptively Secure MPC without Setup -- On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups -- Astrolabous: A Universally Composable Time Lock Encryption Scheme -- Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE -- Simulation-Based Bi-Selective Opening Security for Public Key Encryption -- Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness -- Hierarchical Integrated Signature and Encryption -- Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions -- Onion Routing with Replies -- Private Join and Compute from PIR with Default -- Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures -- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy -- Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. 001441176 506__ $$aAccess limited to authorized users. 001441176 520__ $$aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. 001441176 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 17, 2021). 001441176 650_0 $$aData encryption (Computer science)$$vCongresses. 001441176 650_0 $$aComputer security$$vCongresses. 001441176 650_0 $$aBlockchains (Databases)$$vCongresses. 001441176 650_6 $$aChiffrement (Informatique)$$vCongrès. 001441176 650_6 $$aSécurité informatique$$vCongrès. 001441176 650_6 $$aChaînes de blocs$$vCongrès. 001441176 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001441176 655_7 $$aConference papers and proceedings.$$2lcgft 001441176 655_7 $$aActes de congrès.$$2rvmgf 001441176 655_0 $$aElectronic books. 001441176 7001_ $$aTibouchi, Mehdi,$$eeditor. 001441176 7001_ $$aWang, Huaxiong,$$eeditor. 001441176 7102_ $$aInternational Association for Cryptologic Research. 001441176 77608 $$iPrint version:$$tAdvances in Cryptology - ASIACRYPT 2021.$$dCham : Springer International Publishing AG, ©2022$$z9783030920746 001441176 830_0 $$aLecture notes in computer science ;$$v13091. 001441176 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001441176 852__ $$bebk 001441176 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-92075-3$$zOnline Access$$91397441.1 001441176 909CO $$ooai:library.usi.edu:1441176$$pGLOBAL_SET 001441176 980__ $$aBIB 001441176 980__ $$aEBOOK 001441176 982__ $$aEbook 001441176 983__ $$aOnline 001441176 994__ $$a92$$bISE