Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security and privacy = 2...
~
ACISP (Conference) (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information security and privacy/ edited by Khoa Nguyen ... [et al.].
Reminder of title:
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
remainder title:
ACISP 2022
other author:
Nguyen, Khoa.
corporate name:
ACISP (Conference)
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xix, 530 p. :ill., digital ;24 cm.
[NT 15003449]:
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-22301-3
ISBN:
9783031223013
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
Information security and privacy
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /[electronic resource] :ACISP 2022edited by Khoa Nguyen ... [et al.]. - Cham :Springer International Publishing :2022. - xix, 530 p. :ill., digital ;24 cm. - Lecture notes in computer science,134940302-9743 ;. - Lecture notes in computer science ;13494..
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
ISBN: 9783031223013
Standard No.: 10.1007/978-3-031-22301-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A279 2022
Dewey Class. No.: 005.8
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
LDR
:03551nmm a2200373 a 4500
001
2305555
003
DE-He213
005
20221201132941.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783031223013
$q
(electronic bk.)
020
$a
9783031223006
$q
(paper)
024
7
$a
10.1007/978-3-031-22301-3
$2
doi
035
$a
978-3-031-22301-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A279 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A181 2022
111
2
$a
ACISP (Conference)
$n
(27th :
$d
2022 :
$c
Wollongong, N.S.W.)
$3
3608747
245
1 0
$a
Information security and privacy
$h
[electronic resource] :
$b
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
$c
edited by Khoa Nguyen ... [et al.].
246
3
$a
ACISP 2022
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xix, 530 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13494
505
0
$a
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
520
$a
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
700
1
$a
Nguyen, Khoa.
$3
3529636
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13494.
$3
3608748
856
4 0
$u
https://doi.org/10.1007/978-3-031-22301-3
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9447104
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A279 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login