Public Key Cryptography - PKC 2010

Public Key Cryptography - PKC 2010

Author: Phong Q. Nguyen

Publisher: Springer Science & Business Media

Published: 2010-05-20

Total Pages: 530

ISBN-13: 3642130127

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, held in Paris, France, in May 2010. The 29 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on encryption; cryptanalysis; protocols; network coding; tools; elliptic curves; lossy trapdoor functions; discrete logarithm; and signatures.


Public-key Cryptography -- PKC 2024

Public-key Cryptography -- PKC 2024

Author: Qiang Tang

Publisher: Springer Nature

Published: 2024

Total Pages: 469

ISBN-13: 3031577221

DOWNLOAD EBOOK

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.


Public-Key Cryptography – PKC 2016

Public-Key Cryptography – PKC 2016

Author: Chen-Mou Cheng

Publisher: Springer

Published: 2016-02-20

Total Pages: 479

ISBN-13: 3662493845

DOWNLOAD EBOOK

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.


Public Key Cryptography - PKC 2009

Public Key Cryptography - PKC 2009

Author: Stanislaw Jarecki

Publisher: Springer Science & Business Media

Published: 2009-02-25

Total Pages: 531

ISBN-13: 3642004679

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.


Introduction to Certificateless Cryptography

Introduction to Certificateless Cryptography

Author: Hu Xiong

Publisher: CRC Press

Published: 2016-09-19

Total Pages: 276

ISBN-13: 1315355396

DOWNLOAD EBOOK

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.


Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016

Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016

Author: A. Mathur

Publisher: IOS Press

Published: 2016-01-26

Total Pages: 160

ISBN-13: 1614996172

DOWNLOAD EBOOK

Our increased reliance on computer technology for all aspects of life, from education to business, means that the field of cyber-security has become of paramount importance to us all. This book presents the proceedings of the inaugural Singapore Cyber-Security R&D Conference (SG-CRC 2016), held in Singapore in January 2016, and contains six full and seven short peer-reviewed papers. The conference took as its theme the importance of introducing a technically grounded plan for integrating cyber-security into a system early in the design process, rather than as an afterthought. The element of design is integral to a process, be it a purely software system, such as one engaged in managing online transactions, or a combination of hardware and software such as those used in Industrial Control Systems, pacemakers, and a multitude of IoT devices. SG-CRC 2016 focused on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches, and brought together academics and practitioners from across the world to participate in a program of research papers and industrial best practice, as well as an exhibition of tools. The book will be of interest to all those with a working interest in improved cyber-security.


Homomorphic Signature Schemes

Homomorphic Signature Schemes

Author: Giulia Traverso

Publisher: Springer

Published: 2016-04-21

Total Pages: 73

ISBN-13: 3319321153

DOWNLOAD EBOOK

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.


Proceedings of the Second International Forum on Financial Mathematics and Financial Technology

Proceedings of the Second International Forum on Financial Mathematics and Financial Technology

Author: Zhiyong Zheng

Publisher: Springer Nature

Published: 2023-07-25

Total Pages: 242

ISBN-13: 9819923662

DOWNLOAD EBOOK

This open access book is the documentary of the Second International Forum on Financial Mathematics and Financial Technology, with focus on selected aspects of the current and upcoming trends in FinTech. In detail, the included scientific papers cover financial mathematics and FinTech, presenting the innovative mathematical models and state-of-the-art technologies such as deep learning, with the aim to improve the financial analysis and decision-making and enhance the quality of financial services and risk control. The variety of the papers delivers added value for both scholars and practitioners where they will find perfect integration of elegant mathematical models and up-to-date data mining technologies in financial market analysis. Due to COVID-19, the conference was held virtually on August 13–15, 2021, jointly held by the School of Mathematics of Renmin University of China, the Engineering Research Center of Financial Computing and Digital Engineering of Ministry of Education, the Statistics and Big Data Research Institute of Renmin University of China, the Blockchain Research Institute of Renmin University of China, the Zhongguancun Internet Finance Research Institute, and the Renmin University Press.


Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Jianying Zhou

Publisher: Springer Science & Business Media

Published: 2010-06-09

Total Pages: 576

ISBN-13: 3642137075

DOWNLOAD EBOOK

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010. The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block ciphers and hash functions, side-channel attacks, zero knowledge and multi-party protocols, key management, authentication and identification, privacy and anonymity, RFID security and privacy, and internet security.