000 | 05030nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-29371-9 | ||
003 | DE-He213 | ||
005 | 20240423125516.0 | ||
007 | cr nn 008mamaa | ||
008 | 230330s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031293719 _9978-3-031-29371-9 |
||
024 | 7 |
_a10.1007/978-3-031-29371-9 _2doi |
|
050 | 4 | _aQA76.5-.73 | |
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM011000 _2bisacsh |
|
072 | 7 |
_aUYQE _2thema |
|
082 | 0 | 4 |
_a004 _223 |
245 | 1 | 0 |
_aInformation Security and Cryptology – ICISC 2022 _h[electronic resource] : _b25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers / _cedited by Seung-Hyun Seo, Hwajeong Seo. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXI, 514 p. 115 illus., 64 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13849 |
|
505 | 0 | _aCryptanalysis -- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT -- Implicit Key-stretching Security of Encryption Schemes -- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures -- Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore -- Cyber Security -- Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception -- Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems -- Differential Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery -- Fault and Side-Channel Attack -- Key recovery by side-channel information on the matrix-vector product in code-based cryptosystems -- Differential Fault Attack on AES using Maximum Four Bytes Faulty Ciphertexts -- Efficient Implementation -- A Performance Evaluation of IPsec with Post-Quantum Cryptography -- An Ultrafast Cryptographically Secure Pseudorandom Number Generator -- Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 -- Signature Schemes -- Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature -- Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding -- Group Testing Aggregate Signatures with Soundness -- Attribute-Based Signatures for Range of Inner Product and Its Applications -- Identity-based Interactive Aggregate Signatures from Lattices -- Post-Quantum Cryptography -- Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary Fields -- A Message RecoveryAttack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations -- Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler -- WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership. | |
520 | _aThis book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes. | ||
650 | 0 | _aComputers, Special purpose. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputer systems. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputer System Implementation. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aSeo, Seung-Hyun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSeo, Hwajeong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031293702 |
776 | 0 | 8 |
_iPrinted edition: _z9783031293726 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13849 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-29371-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c178712 _d178712 |