000 -LEADER |
fixed length control field |
04402nam a22005417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
APU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20221028165308.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220307s2015 nyua fsb 000 0deng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627055383 (pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627055482 (epub) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781627055376 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781627055499 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)908155895 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00404865 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Transcribing agency |
APU |
Modifying agency |
SF |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
G37 2015eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Garg, Sanjam., |
9 (RLIN) |
47388 |
245 10 - TITLE STATEMENT |
Title |
Candidate multilinear maps |
Medium |
[electronic resources] / |
Statement of responsibility, etc |
Sanjam Garg. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
[New York] : |
Name of publisher, distributor, etc |
Association for Computing Machinery, |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
[San Rafael, California] : |
Name of publisher, distributor, etc |
Morgan & Claypool, |
Date of publication, distribution, etc |
c2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resources (xi, 108 pages) : |
Other physical details |
illustrations. |
490 1# - SERIES STATEMENT |
Series statement |
ACM books ; |
Volume number/sequential designation |
#5 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references (pages 95-108). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 Our results -- 1.2 Brief overview -- 1.3 Organization -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. Survey of applications -- 2.1 How flexible can we make access to encrypted data? -- 2.2 Program obfuscation -- 2.3 Other applications -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Multilinear maps and graded encoding systems -- 3.1 Cryptographic multilinear maps -- 3.1.1 Efficient procedures -- 3.1.2 Hardness assumptions -- 3.2 Graded encoding schemes -- 3.2.1 Efficient procedures, the dream version -- 3.2.2 Efficient procedures, the real-life version -- 3.2.3 Hardness assumptions -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. Preliminaries I: lattices -- 4.1 Lattices -- 4.2 Gaussians on lattices -- 4.3 Sampling from discrete Gaussian -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Preliminaries II: algebraic number theory background -- 5.1 Number fields and rings of integers -- 5.2 Embeddings and geometry -- 5.3 Ideals in the ring of integers -- 5.4 Prime ideals, unique factorization and distributions -- 5.5 Ideal lattices -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
6. The new encoding schemes -- 6.1 The basic graded encoding scheme -- 6.2 Setting the parameters -- 6.3 Extensions and variants -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
7. Security of our constructions -- 7.1 Our hardness assumption -- 7.2 Simplistic models of attacks -- 7.2.1 Hardness of GCDH in the arithmetic straight-line program model -- 7.3 Cryptanalysis beyond the generic models -- 7.3.1 Easily computable quantities -- 7.3.2 Using averaging attacks -- 7.3.3 Cryptanalysis with extra help -- 7.4 Some countermeasures -- 7.5 Easiness of other problems -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
8. Preliminaries III: computation in a number field -- 8.1 Some computational aspects of number fields and ideal lattices -- 8.2 Computational hardness assumptions over number fields -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
9. Survey of lattice cryptanalysis -- 9.1 Averaging attacks -- 9.2 Gentry-Szydlo: recovering v from v.v and (v) -- 9.3 Nguyen-Regev: a gradient descent attack -- 9.4 Ducas-Nguyen: gradient descent over zonotopes and deformed parallelepipeds -- 9.5 A new algorithm for the closest principal ideal generator problem -- 9.6 Coppersmith attacks -- 9.7 Dimension halving in principal ideal lattices -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
10. One-round key exchange -- 10.1 Definitions -- 10.2 Our construction -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Appendix A. Generalizing graded encoding systems -- Efficient procedures, the dream version -- Efficient procedures, the real-life version -- Hardness assumptions -- Bibliography -- Author's biography. |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Online version restricted to APU staff and students only. |
520 3# - SUMMARY, ETC. |
Summary, etc |
Cryptography to me is "black magic," enabling tasks that often seem paradoxical or simply just impossible. Like the space explorers, we cryptographers often wonder, "What are the boundaries of this world of 'black magic'?" This book lays one of the founding stones in furthering our understanding of these edges. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Internet connectivity; World Wide Web browser.and Adobe Acrobat Reader. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography. |
9 (RLIN) |
11359 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
ACM books ; |
Volume number/sequential designation |
#5. |
9 (RLIN) |
47379 |
856 48 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://dl-acm-org.ezproxy.apu.edu.my/doi/book/10.1145/2714451 |
Link text |
Available in ACM Digital Library. Requires Log In to view full text. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-Book |