Rezazadeh Baee / Simpson | Information Security and Privacy | Buch | 978-3-031-35485-4 | sack.de

Buch, Englisch, Band 13915, 652 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1009 g

Reihe: Lecture Notes in Computer Science

Rezazadeh Baee / Simpson

Information Security and Privacy

28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings
1. Auflage 2023
ISBN: 978-3-031-35485-4
Verlag: Springer Nature Switzerland

28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings

Buch, Englisch, Band 13915, 652 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1009 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-35485-4
Verlag: Springer Nature Switzerland


This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023.

The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects ofsymmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.

Rezazadeh Baee / Simpson Information Security and Privacy jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Symmetric-Key Cryptography.- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures.- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers.- A New Correlation Cube Attack Based on Division Property.- The Triangle Differential Cryptanalysis.- Key Recovery Attacks on Grain-like Keystream Generators with Key Injection.- Related-Cipher Attacks: Applications to Ballet and ANT.- Cryptanalysis of SPEEDY.- Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure.- Exploring Formal Methods for Cryptographic Hash FunctionImplementations.- Public-Key Cryptography.- A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM.- Compact Password Authenticated Key Exchange from Group Actions.- Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE.- Identity-Based Encryptionfrom Lattices Using Approximate Trapdoors.- Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications.- Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.- Post-Quantum Cryptography.- Quantum-access Security of Hash-based Signature Schemes.- Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model.- Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security.- Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.- Memory-Efficient Quantum Information Set Decoding Algorithm.- Cryptographic Protocols.- CSI-SharK: CSI-FiSh with Sharing-friendly Keys.- Practical Verifiable Random Function with RKA Security.- Statistically Consistent Broadcast Authenticated Encryption withKeyword Search Adaptive Security from Standard Assumptions.- Modular Design of KEM-Based Authenticated Key Exchange.- Reusable, Instant and Private Payment Guarantees for Cryptocurrencies.- System Security.- BinAlign: Alignment Padding based Compiler Provenance Recovery.- Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.