Asia Pacific University Library catalogue


Candidate multilinear maps (Record no. 383688)

000 -LEADER
fixed length control field 04402nam a22005417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221028165308.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220307s2015 nyua fsb 000 0deng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627055383 (pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627055482 (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781627055376
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781627055499
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)908155895
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00404865
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Transcribing agency APU
Modifying agency SF
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number G37 2015eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Garg, Sanjam.,
9 (RLIN) 47388
245 10 - TITLE STATEMENT
Title Candidate multilinear maps
Medium [electronic resources] /
Statement of responsibility, etc Sanjam Garg.
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc [New York] :
Name of publisher, distributor, etc Association for Computing Machinery,
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc [San Rafael, California] :
Name of publisher, distributor, etc Morgan & Claypool,
Date of publication, distribution, etc c2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resources (xi, 108 pages) :
Other physical details illustrations.
490 1# - SERIES STATEMENT
Series statement ACM books ;
Volume number/sequential designation #5
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 95-108).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Our results -- 1.2 Brief overview -- 1.3 Organization --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Survey of applications -- 2.1 How flexible can we make access to encrypted data? -- 2.2 Program obfuscation -- 2.3 Other applications --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Multilinear maps and graded encoding systems -- 3.1 Cryptographic multilinear maps -- 3.1.1 Efficient procedures -- 3.1.2 Hardness assumptions -- 3.2 Graded encoding schemes -- 3.2.1 Efficient procedures, the dream version -- 3.2.2 Efficient procedures, the real-life version -- 3.2.3 Hardness assumptions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Preliminaries I: lattices -- 4.1 Lattices -- 4.2 Gaussians on lattices -- 4.3 Sampling from discrete Gaussian --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Preliminaries II: algebraic number theory background -- 5.1 Number fields and rings of integers -- 5.2 Embeddings and geometry -- 5.3 Ideals in the ring of integers -- 5.4 Prime ideals, unique factorization and distributions -- 5.5 Ideal lattices --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. The new encoding schemes -- 6.1 The basic graded encoding scheme -- 6.2 Setting the parameters -- 6.3 Extensions and variants --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Security of our constructions -- 7.1 Our hardness assumption -- 7.2 Simplistic models of attacks -- 7.2.1 Hardness of GCDH in the arithmetic straight-line program model -- 7.3 Cryptanalysis beyond the generic models -- 7.3.1 Easily computable quantities -- 7.3.2 Using averaging attacks -- 7.3.3 Cryptanalysis with extra help -- 7.4 Some countermeasures -- 7.5 Easiness of other problems --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8. Preliminaries III: computation in a number field -- 8.1 Some computational aspects of number fields and ideal lattices -- 8.2 Computational hardness assumptions over number fields --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 9. Survey of lattice cryptanalysis -- 9.1 Averaging attacks -- 9.2 Gentry-Szydlo: recovering v from v.v and (v) -- 9.3 Nguyen-Regev: a gradient descent attack -- 9.4 Ducas-Nguyen: gradient descent over zonotopes and deformed parallelepipeds -- 9.5 A new algorithm for the closest principal ideal generator problem -- 9.6 Coppersmith attacks -- 9.7 Dimension halving in principal ideal lattices --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 10. One-round key exchange -- 10.1 Definitions -- 10.2 Our construction --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Appendix A. Generalizing graded encoding systems -- Efficient procedures, the dream version -- Efficient procedures, the real-life version -- Hardness assumptions -- Bibliography -- Author's biography.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Online version restricted to APU staff and students only.
520 3# - SUMMARY, ETC.
Summary, etc Cryptography to me is "black magic," enabling tasks that often seem paradoxical or simply just impossible. Like the space explorers, we cryptographers often wonder, "What are the boundaries of this world of 'black magic'?" This book lays one of the founding stones in furthering our understanding of these edges.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Internet connectivity; World Wide Web browser.and Adobe Acrobat Reader.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
9 (RLIN) 11359
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title ACM books ;
Volume number/sequential designation #5.
9 (RLIN) 47379
856 48 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://dl-acm-org.ezproxy.apu.edu.my/doi/book/10.1145/2714451
Link text Available in ACM Digital Library. Requires Log In to view full text.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Date last seen Copy number Price effective from Koha item type
Not Withdrawn Available   Not Damaged Available for loan E-Book APU Library APU Library Online Database 07/03/2022 OTHERS   QA76.9.A25 G37 2015eb 07/03/2022 1 07/03/2022 General Circulation