Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers: Lecture Notes in Computer Science, cartea 13837
Editat de Yi Deng, Moti Yungen Limba Engleză Paperback – 19 feb 2023
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis,
Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 984.64 lei - 20%
Preț: 400.77 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 556.96 lei - 20%
Preț: 560.93 lei - 15%
Preț: 558.12 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 733.68 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 478.59 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 620.33 lei - 20%
Preț: 731.97 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 403.00 lei - 20%
Preț: 563.29 lei - 20%
Preț: 324.19 lei - 20%
Preț: 793.92 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 558.53 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 497.21 lei
Preț vechi: 621.51 lei
-20%
Puncte Express: 746
Preț estimativ în valută:
87.92€ • 100.82$ • 75.99£
87.92€ • 100.82$ • 75.99£
Carte disponibilă
Livrare economică 06-20 aprilie
Livrare express 20-26 martie pentru 43.03 lei
Specificații
ISBN-13: 9783031265525
ISBN-10: 3031265521
Pagini: 496
Ilustrații: X, 496 p. 118 illus., 70 illus. in color.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.71 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031265521
Pagini: 496
Ilustrații: X, 496 p. 118 illus., 70 illus. in color.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.71 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.- Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.