Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part I: Lecture Notes in Computer Science, cartea 14895
Editat de Tianqing Zhu, Yannan Lien Limba Engleză Paperback – 16 iul 2024
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (3) | 795.20 lei 6-8 săpt. | |
| Springer Nature Singapore – 16 iul 2024 | 795.20 lei 6-8 săpt. | |
| Springer Nature Singapore – 16 iul 2024 | 956.89 lei 6-8 săpt. | |
| Springer Nature Singapore – 15 iul 2024 | 957.38 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 795.20 lei
Preț vechi: 994.01 lei
-20%
Puncte Express: 1193
Preț estimativ în valută:
140.76€ • 163.50$ • 121.95£
140.76€ • 163.50$ • 121.95£
Carte tipărită la comandă
Livrare economică 02-16 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819750245
ISBN-10: 9819750245
Pagini: 496
Ilustrații: XXI, 496 p. 61 illus., 27 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
ISBN-10: 9819750245
Pagini: 496
Ilustrații: XXI, 496 p. 61 illus., 27 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.72 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
Cuprins
Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.- Encryption and its Applications.- Key Cooperative Attribute-Based Encryption.- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks.- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives.- Continuous Version of Non malleable Codes from Authenticated Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM.- Threshold Ring Signatures with Accountability.- Threshold Signatures with Private Accountability via Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window τ NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective.- Hadamard product argument from Lagrange-based univariate polynomials.