Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13837
  • Izdošanas datums: 18-Feb-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031265532
  • Formāts - PDF+DRM
  • Cena: 83,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13837
  • Izdošanas datums: 18-Feb-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031265532

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. 

The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, 
Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC:
A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for
Searching for Impossible Differentials Using Undisturbed Bits.- Public key
Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical
Integrated Encryption and Signature.- SR-MuSig2: A Scalable and
Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type
encryption based on Gabidulin codes with no hidden
structure.- Quantum.- Optimizing the depth of quantum implementations of
linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model,
Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality
and Intersection-Sum Under Arbitrary Collusion.-  Amortizing Division and
Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and
Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering
Effect of Iterative Differential and Linear Trails.- Differential
Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of
Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable
Complex Multiplication of Elliptic Curves.- Several classes of Niho type
Boolean functions with few Walsh transform values.- Stream
ciphers.- Higher-Order Masking Scheme for Trivium Hardware
Implementation.- An Experimentally Verified Attack on 820-Round
Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using
Transductive Classification.- Detecting API Missing-Check Bugs Through
Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor
Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic
Camouflage Adversarial Examples using Mimetic Feature for 3D
Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the
Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring
Sequences Produced by the Quadratic Generator.