Information Security and Privacy (eBook, PDF)
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I
Redaktion: Zhu, Tianqing; Li, Yannan
97,95 €
97,95 €
inkl. MwSt.
Sofort per Download lieferbar
49 °P sammeln
97,95 €
Als Download kaufen
97,95 €
inkl. MwSt.
Sofort per Download lieferbar
49 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
97,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
49 °P sammeln
Information Security and Privacy (eBook, PDF)
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I
Redaktion: Zhu, Tianqing; Li, Yannan
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 14.36MB
Andere Kunden interessierten sich auch für
- Information Security and Privacy (eBook, PDF)113,95 €
- Applied Cryptography and Network Security (eBook, PDF)65,95 €
- Advances in Information and Computer Security (eBook, PDF)40,95 €
- Machine Learning for Cyber Security (eBook, PDF)81,95 €
- Advances in Information and Computer Security (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
-
-
-
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 496
- Erscheinungstermin: 15. Juli 2024
- Englisch
- ISBN-13: 9789819750252
- Artikelnr.: 72243868
- Verlag: Springer Nature Singapore
- Seitenzahl: 496
- Erscheinungstermin: 15. Juli 2024
- Englisch
- ISBN-13: 9789819750252
- Artikelnr.: 72243868
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.- Encryption and its Applications.- Key Cooperative Attribute-Based Encryption.- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks.- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives.- Continuous Version of Non malleable Codes from Authenticated Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM.- Threshold Ring Signatures with Accountability.- Threshold Signatures with Private Accountability via Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective.- Hadamard product argument from Lagrange-based univariate polynomials.
Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.- Encryption and its Applications.- Key Cooperative Attribute-Based Encryption.- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks.- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives.- Continuous Version of Non malleable Codes from Authenticated Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM.- Threshold Ring Signatures with Accountability.- Threshold Signatures with Private Accountability via Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective.- Hadamard product argument from Lagrange-based univariate polynomials.