000 05459nam a22006735i 4500
001 978-981-97-0945-8
003 DE-He213
005 20240423130310.0
007 cr nn 008mamaa
008 240224s2024 si | s |||| 0|eng d
020 _a9789819709458
_9978-981-97-0945-8
024 7 _a10.1007/978-981-97-0945-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Security and Cryptology
_h[electronic resource] :
_b19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II /
_cedited by Chunpeng Ge, Moti Yung.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXVII, 419 p. 114 illus., 90 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14527
505 0 _aSystem Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models -- An Android Malware Detection Method Using Better API Contextual Information -- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method -- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation -- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing -- TIA: Token Importance Transferable Attack on Vision Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr -- Automatic Search of Linear Structure: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 -- Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound -- Full Round Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments -- Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things -- TRGE: A Backdoor Detection after Quantizatio -- Improved Homomorphic Evaluation for Hash Function based on TFHE -- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM -- Partial Key Exposure Attack on Common Prime RSA -- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth.
520 _aThe two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
650 0 _aData protection.
650 0 _aImage processing
_xDigital techniques.
650 0 _aComputer vision.
650 0 _aComputer networks .
650 0 _aApplication software.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 1 4 _aData and Information Security.
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aMobile and Network Security.
650 2 4 _aCryptology.
700 1 _aGe, Chunpeng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aYung, Moti.
_eeditor.
_0(orcid)
_10000-0003-0848-0873
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819709441
776 0 8 _iPrinted edition:
_z9789819709465
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14527
856 4 0 _uhttps://doi.org/10.1007/978-981-97-0945-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c187121
_d187121