Information security and privacy = 2...
ACISP (Conference) (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and privacy/ edited by Tianqing Zhu, Yannan Li.
    其他題名: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024 : proceedings.
    其他題名: ACISP 2024
    其他作者: Zhu, Tianqing.
    團體作者: ACISP (Conference)
    出版者: Singapore :Springer Nature Singapore : : 2024.,
    面頁冊數: xiii, 456 p. :ill. (some col.), digital ;24 cm.
    內容註: Post Quantum Cryptography -- Improved Multimodal Private Signatures from Lattices -- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based more general anti leakage model and its application in decentralization -- An Efficient Hardware Implementation of Crystal Dilithium on FPGA -- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime -- Jumping for Berstein Yang Inversion -- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs -- Faster verifications and smaller signatures Trade offs for Alteq using rejections -- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks -- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem -- Cryptanalysis -- New Strategy for Evaluating Differential Clustering Effect of uBlock -- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2 -- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack -- Secure Protocols -- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System -- Formal Verification of Challenge Flow in EMV 3D Secure -- Size Hiding Computation in the Honest But Curious Model -- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation -- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation -- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA -- Application Security -- Deep Dive on Relationship between Personality and Password Creation -- Unveiling the Unseen Video Recognition Attacks on Social Software -- An Account Matching Method Based on Hyper Graph.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-97-5028-3
    ISBN: 9789819750283
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入