Information security and cryptology ...
Deng, Yi.

FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology = 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and cryptology/ edited by Yi Deng, Moti Yung.
    其他題名: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022 : revised selected papers /
    其他作者: Deng, Yi.
    出版者: Cham :Springer Nature Switzerland : : 2023.,
    面頁冊數: x, 496 p. :ill., digital ;24 cm.
    內容註: Block Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-26553-2
    ISBN: 9783031265532
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入