Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_9949450241302882
    Umfang: X, 496 p. 191 illus., 70 illus. in color. , online resource.
    Ausgabe: 1st ed. 2023.
    ISBN: 9783031265532
    Serie: Lecture Notes in Computer Science, 13837
    Inhalt: This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
    Anmerkung: Block Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783031265525
    Weitere Ausg.: Printed edition: ISBN 9783031265549
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz