Information Security and Cryptology – ICISC 2022 (Record no. 178712)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05030nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-29371-9 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125516.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230330s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031293719 |
-- | 978-3-031-29371-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-29371-9 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.5-.73 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UYQE |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM011000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UYQE |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security and Cryptology – ICISC 2022 |
Medium | [electronic resource] : |
Remainder of title | 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers / |
Statement of responsibility, etc | edited by Seung-Hyun Seo, Hwajeong Seo. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XI, 514 p. 115 illus., 64 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 13849 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cryptanalysis -- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT -- Implicit Key-stretching Security of Encryption Schemes -- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures -- Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore -- Cyber Security -- Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception -- Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems -- Differential Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery -- Fault and Side-Channel Attack -- Key recovery by side-channel information on the matrix-vector product in code-based cryptosystems -- Differential Fault Attack on AES using Maximum Four Bytes Faulty Ciphertexts -- Efficient Implementation -- A Performance Evaluation of IPsec with Post-Quantum Cryptography -- An Ultrafast Cryptographically Secure Pseudorandom Number Generator -- Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 -- Signature Schemes -- Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature -- Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding -- Group Testing Aggregate Signatures with Soundness -- Attribute-Based Signatures for Range of Inner Product and Its Applications -- Identity-based Interactive Aggregate Signatures from Lattices -- Post-Quantum Cryptography -- Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary Fields -- A Message RecoveryAttack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations -- Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler -- WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers, Special purpose. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Application software. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Special Purpose and Application-Based Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer System Implementation. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer and Information Systems Applications. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Structures and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Seo, Seung-Hyun. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Seo, Hwajeong. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031293702 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031293726 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 13849 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-29371-9">https://doi.org/10.1007/978-3-031-29371-9</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.