Information Security and Cryptology
18th International Conference, Inscrypt 2022, Beijing, China, December 11¿13, 2022, Revised Selected Papers
Herausgegeben:Deng, Yi; Yung, Moti
Information Security and Cryptology
18th International Conference, Inscrypt 2022, Beijing, China, December 11¿13, 2022, Revised Selected Papers
Herausgegeben:Deng, Yi; Yung, Moti
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Andere Kunden interessierten sich auch für
- Progress in Cryptology - INDOCRYPT 201839,99 €
- Advances in Cryptology ¿ ASIACRYPT 202285,99 €
- Information Security and Cryptology39,99 €
- Theory of Cryptography131,99 €
- Information Security and Cryptology70,99 €
- Theory of Cryptography50,99 €
- Advances in Cryptology ¿ ASIACRYPT 202277,99 €
-
-
-
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022.
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 13837
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-26552-5
- 1st ed. 2023
- Seitenzahl: 512
- Erscheinungstermin: 19. Februar 2023
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 768g
- ISBN-13: 9783031265525
- ISBN-10: 3031265521
- Artikelnr.: 67252568
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 13837
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-26552-5
- 1st ed. 2023
- Seitenzahl: 512
- Erscheinungstermin: 19. Februar 2023
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 768g
- ISBN-13: 9783031265525
- ISBN-10: 3031265521
- Artikelnr.: 67252568
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.