Information Security and Cryptology (eBook, PDF)
18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers
Redaktion: Deng, Yi; Yung, Moti
65,95 €
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
65,95 €
Als Download kaufen
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Information Security and Cryptology (eBook, PDF)
18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers
Redaktion: Deng, Yi; Yung, Moti
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 24.34MB
Andere Kunden interessierten sich auch für
- Information Security and Cryptology (eBook, PDF)40,95 €
- Information Security and Cryptology - ICISC 2020 (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
- Innovative Security Solutions for Information Technology and Communications (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)73,95 €
- -23%11Information Security and Cryptology - ICISC 2021 (eBook, PDF)69,95 €
- Innovative Security Solutions for Information Technology and Communications (eBook, PDF)40,95 €
-
- -30%11
-
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022.
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis,
Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 496
- Erscheinungstermin: 18. Februar 2023
- Englisch
- ISBN-13: 9783031265532
- Artikelnr.: 67478080
- Verlag: Springer International Publishing
- Seitenzahl: 496
- Erscheinungstermin: 18. Februar 2023
- Englisch
- ISBN-13: 9783031265532
- Artikelnr.: 67478080
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.