Buch, Englisch, Band 13837, 496 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 768 g
18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers
Buch, Englisch, Band 13837, 496 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 768 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-26552-5
Verlag: Springer
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Block Ciphers .- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature .- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum .- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC .- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis .- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto .- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers .- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware .- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices .- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.




