Information security and privacy = 2...
ACISP (Conference) (2022 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and privacy/ edited by Khoa Nguyen ... [et al.].
    其他題名: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022 : proceedings /
    其他題名: ACISP 2022
    其他作者: Nguyen, Khoa.
    團體作者: ACISP (Conference)
    出版者: Cham :Springer International Publishing : : 2022.,
    面頁冊數: xix, 530 p. :ill., digital ;24 cm.
    內容註: Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher -- Improved Differential Attack on Round-Reduced LEA -- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints -- Improved Division Property for Ciphers with Complex Linear Layers -- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key Cryptography -- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption -- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace -- TIDE: A novel approach to constructing timed-release encryption -- Multi-signatures for ECDSA and its Applications in Blockchain -- Post-Quantum Cryptography -- Fiat-Shamir Signatures based on Module-NTRU -- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling -- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security -- Cryptographic Protocols -- Verifiable Decryption in the Head -- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives -- On Security of Fuzzy Commitment Scheme for Biometric Authentication -- SoK: Decentralized Randomness Beacon Protocols -- Blockchain -- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts -- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding -- Garrison: A Novel Watchtower Scheme for Bitcoin -- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-22301-3
    ISBN: 9783031223013
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9447104 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A279 2022 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入