Information security and privacy = 2...
ACISP (Conference) (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and privacy/ edited by Khoa Nguyen ... [et al.].
    Reminder of title: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
    remainder title: ACISP 2022
    other author: Nguyen, Khoa.
    corporate name: ACISP (Conference)
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xix, 530 p. :ill., digital ;24 cm.
    [NT 15003449]: Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-22301-3
    ISBN: 9783031223013
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9447104 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A279 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login