Information Security and Privacy
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15¿17, 2024, Proceedings, Part II
Herausgegeben:Zhu, Tianqing; Li, Yannan
Information Security and Privacy
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15¿17, 2024, Proceedings, Part II
Herausgegeben:Zhu, Tianqing; Li, Yannan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Andere Kunden interessierten sich auch für
- Information Security and Privacy55,99 €
- Public-Key Cryptography ¿ PKC 201637,99 €
- Public-Key Cryptography ¿ PKC 201637,99 €
- Machine Learning for Cyber Security81,99 €
- Information Security and Cryptology37,99 €
- Applied Cryptography and Network Security60,99 €
- Advances in Information and Computer Security37,99 €
-
-
-
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14896
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5027-6
- 2024
- Seitenzahl: 472
- Erscheinungstermin: 16. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 710g
- ISBN-13: 9789819750276
- ISBN-10: 981975027X
- Artikelnr.: 70902417
- Lecture Notes in Computer Science 14896
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5027-6
- 2024
- Seitenzahl: 472
- Erscheinungstermin: 16. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 710g
- ISBN-13: 9789819750276
- ISBN-10: 981975027X
- Artikelnr.: 70902417
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.