語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security and privacy = 2...
~
ACISP (Conference) (2022 :)
FindBook
Google Book
Amazon
博客來
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security and privacy/ edited by Khoa Nguyen ... [et al.].
其他題名:
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
其他題名:
ACISP 2022
其他作者:
Nguyen, Khoa.
團體作者:
ACISP (Conference)
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xix, 530 p. :ill., digital ;24 cm.
內容註:
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-22301-3
ISBN:
9783031223013
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
Information security and privacy
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /[electronic resource] :ACISP 2022edited by Khoa Nguyen ... [et al.]. - Cham :Springer International Publishing :2022. - xix, 530 p. :ill., digital ;24 cm. - Lecture notes in computer science,134940302-9743 ;. - Lecture notes in computer science ;13494..
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
ISBN: 9783031223013
Standard No.: 10.1007/978-3-031-22301-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A279 2022
Dewey Class. No.: 005.8
Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
LDR
:03551nmm a2200373 a 4500
001
2305555
003
DE-He213
005
20221201132941.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783031223013
$q
(electronic bk.)
020
$a
9783031223006
$q
(paper)
024
7
$a
10.1007/978-3-031-22301-3
$2
doi
035
$a
978-3-031-22301-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A279 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A181 2022
111
2
$a
ACISP (Conference)
$n
(27th :
$d
2022 :
$c
Wollongong, N.S.W.)
$3
3608747
245
1 0
$a
Information security and privacy
$h
[electronic resource] :
$b
27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
$c
edited by Khoa Nguyen ... [et al.].
246
3
$a
ACISP 2022
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xix, 530 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13494
505
0
$a
Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
520
$a
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
700
1
$a
Nguyen, Khoa.
$3
3529636
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13494.
$3
3608748
856
4 0
$u
https://doi.org/10.1007/978-3-031-22301-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9447104
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A279 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入