,

Information Security and Privacy

28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Proceedings

Paperback Engels 2023 9783031354854
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023.

The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.

Specificaties

ISBN13:9783031354854
Taal:Engels
Bindwijze:paperback
Uitgever:Springer Nature Switzerland

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Symmetric-Key Cryptography.-&nbsp;Improved Differential Cryptanalysis on SPECK Using Plaintext Structures.-&nbsp;Linear Cryptanalysis and Its Variants with Fast Fourier Transformation&nbsp;Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers.-&nbsp;A New Correlation Cube Attack Based on Division Property.-&nbsp;The Triangle Differential Cryptanalysis.-&nbsp;Key Recovery Attacks on Grain-like Keystream Generators with Key&nbsp;Injection.-&nbsp;Related-Cipher Attacks: Applications to Ballet and ANT.-&nbsp;Cryptanalysis of SPEEDY.-&nbsp;Reconsidering Generic Composition: the modes A10, A11 and A12 are&nbsp;insecure.-&nbsp;Exploring Formal Methods for Cryptographic Hash FunctionImplementations.-&nbsp;Public-Key Cryptography.-&nbsp;A Tightly Secure ID-Based Signature Scheme under DL Assumption in&nbsp;AGM.-&nbsp;Compact Password Authenticated Key Exchange from Group Actions.-&nbsp;Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE.-&nbsp;Identity-Based Encryption from Lattices Using Approximate Trapdoors.-&nbsp;Homomorphic Signatures for Subset and Superset Mixed Predicates&nbsp;and Its Applications.-&nbsp;Adaptively Secure Identity-Based Encryption from Middle-Product&nbsp;Learning with Errors.-&nbsp;Post-Quantum Cryptography.-&nbsp;Quantum-access Security of Hash-based Signature Schemes.-&nbsp;Tightly Secure Lattice Identity-Based Signature in the Quantum&nbsp;Random Oracle Model.-&nbsp;Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security.-&nbsp;Quantum Algorithm for Finding Impossible Differentials and&nbsp;Zero-Correlation Linear Hulls of Symmetric Ciphers.-&nbsp;Memory-Efficient Quantum Information Set Decoding Algorithm.-&nbsp;Cryptographic Protocols.-&nbsp;CSI-SharK: CSI-FiSh with Sharing-friendly Keys.-&nbsp;Practical Verifiable Random Function with RKA Security.-&nbsp;Statistically Consistent Broadcast Authenticated Encryption with<div>Keyword Search Adaptive Security from Standard Assumptions.-&nbsp;Modular Design of KEM-Based Authenticated Key Exchange.-&nbsp;Reusable, Instant and Private Payment Guarantees for Cryptocurrencies.-&nbsp;System Security.-&nbsp;BinAlign: Alignment Padding based Compiler Provenance Recovery.-&nbsp;Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network.</div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Information Security and Privacy