Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 1113, 2022, Revised Selected Papers 1st ed. 2023 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 496 pages, height x width: 235x155 mm, weight: 777 g, 70 Illustrations, color; 48 Illustrations, black and white; X, 496 p. 118 illus., 70 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13837
  • Izdošanas datums: 19-Feb-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031265521
  • ISBN-13: 9783031265525
  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 496 pages, height x width: 235x155 mm, weight: 777 g, 70 Illustrations, color; 48 Illustrations, black and white; X, 496 p. 118 illus., 70 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13837
  • Izdošanas datums: 19-Feb-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031265521
  • ISBN-13: 9783031265525
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. 

The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, 
Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC:
A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for
Searching for Impossible Differentials Using Undisturbed Bits.- Public key
Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical
Integrated Encryption and Signature.- SR-MuSig2: A Scalable and
Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type
encryption based on Gabidulin codes with no hidden
structure.- Quantum.- Optimizing the depth of quantum implementations of
linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model,
Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality
and Intersection-Sum Under Arbitrary Collusion.-  Amortizing Division and
Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and
Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering
Effect of Iterative Differential and Linear Trails.- Differential
Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of
Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable
Complex Multiplication of Elliptic Curves.- Several classes of Niho type
Boolean functions with few Walsh transform values.- Stream
ciphers.- Higher-Order Masking Scheme for Trivium Hardware
Implementation.- An Experimentally Verified Attack on 820-Round
Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using
Transductive Classification.- Detecting API Missing-Check Bugs Through
Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor
Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic
Camouflage Adversarial Examples using Mimetic Feature for 3D
Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the
Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring
Sequences Produced by the Quadratic Generator.