Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 1416, 2024, Revised Selected Papers, Part II [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 487 pages, height x width: 235x155 mm, 39 Illustrations, color; 42 Illustrations, black and white; XIX, 487 p. 81 illus., 39 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15544
  • Izdošanas datums: 03-May-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819647339
  • ISBN-13: 9789819647330
  • Mīkstie vāki
  • Cena: 75,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 88,79 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 487 pages, height x width: 235x155 mm, 39 Illustrations, color; 42 Illustrations, black and white; XIX, 487 p. 81 illus., 39 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15544
  • Izdošanas datums: 03-May-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819647339
  • ISBN-13: 9789819647330
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024.
 
The 47 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:
 
Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.
 
Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
.- Public Key Cryptosystems.


.- Extended Policy-based Sanitizable Signatures.


.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash
and Instantiations.


.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud
Storage.


.- Generalized Cryptanalysis of Cubic Pell RSA.


.- On Concrete Security Treatment of Signatures Based on Multiple Discrete
Logarithms.


.- Hierarchical Functional Encryption for Quadratic Transformation.


.- Solving Modular Linear Equations via Automated Coppersmith and
its Applications.


.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.


.- Security Protocols Analysis.


.- Permutation Argument via Bases Transformation.


.- Efficient and Verifiable Multi-Server Framework for Secure
Information Classification and Storage.


.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.


.- Symmetric Cryptanalysis. 


.- Committing Security of AEAD Based on Stream Cipher.


.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction
Method.


.- Cube Attacks against Trivium, Kreyvium and ACORN with
Practical Complexity..


.- Improving the Search Algorithm for the Best Differential/Linear Trails of
Bit-Permutation-Based Ciphers.


.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.


.- An Automatic Search Method For 4-bit S-box Towards
Considering Cryptographic Properties and Hardware Area Simultaneously.


.-  Revisiting Truncated Differential Attack from the Perspective of
Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.


.- Cryptanalysis of BAKSHEESH Block Cipher.


.- Quantum and Post Quantum Cryptography. 


.- Quantum Cryptanalysis of Generalized Unbalanced Feistel
Structures: Distinguisher and Key Recovery Attack.


.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and
TWINE.


.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for
FALCON.


.- Quantum Public-Key Encryption of Quantum States, and More.