Atjaunināt sīkdatņu piekrišanu

Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 2830, 2022, Proceedings 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 530 pages, height x width: 235x155 mm, weight: 836 g, 32 Illustrations, color; 45 Illustrations, black and white; XIX, 530 p. 77 illus., 32 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13494
  • Izdošanas datums: 02-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031223004
  • ISBN-13: 9783031223006
  • Mīkstie vāki
  • Cena: 82,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 97,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 530 pages, height x width: 235x155 mm, weight: 836 g, 32 Illustrations, color; 45 Illustrations, black and white; XIX, 530 p. 77 illus., 32 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13494
  • Izdošanas datums: 02-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031223004
  • ISBN-13: 9783031223006
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Symmetric-Key Cryptography
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256
3(21)
Jian Guo
Ling Song
Haoyang Wang
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
24(22)
Lorenzo Grassi
Christian Rechberger
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher
46(21)
Shotaro Miyashita
Ryoma Ito
Atsuko Miyaji
Improved Differential Attack on Round-Reduced LEA
67(18)
Yuhan Zhang
Wenling Wu
Lei Zhang
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints
85(21)
Subodh Bijwe
Amit Kumar Chauhan
Somitra Kumar Sanadhya
Improved Division Property for Ciphers with Complex Linear Layers
106(19)
Yongxia Mao
Wenling Wu
Bolin Wang
Li Zhang
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
125(22)
Alexandre Adomnicai
Kazuhiko Minematsu
Maki Shigeri
Public-Key Cryptanalysis
Handle the Traces: Revisiting the Attack on ECDSA with EHNP
147(21)
Jinzheng Cao
Yanbin Pan
Qingfeng Cheng
Xinghua Li
Hybrid Dual and Meet-LWE Attack
168(21)
Lei Bi
Xianhui Lu
Junjie Luo
Kunpeng Wang
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018
189(20)
Wenshuo Guo
Fang-Wei Fu
Public-Key Cryptography
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
209(20)
Yusaku Maeda
Koji Nuida
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
229(15)
Yumei Li
Mingwu Zhang
Futai Zhang
TIDE: A Novel Approach to Constructing Timed-Release Encryption
244(21)
Angelique Faye Loe
Liam Medley
Christian O'Connell
Elizabeth A. Quaglia
Multi-signatures for ECDSA and Its Applications in Blockchain
265(24)
Shimin Pan
Kwan Yin Chan
Handong Cui
Tsz Hon Yuen
Post-quantum Cryptography
Fiat-Shamir Signatures Based on Module-NTRU
289(20)
Shi Bai
Austin Beard
Floyd Johnson
Sulani K. B. Vidhanalage
Tran Ngo
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling
309(23)
Kittiphon Phalakarn
Vorapong Suppakitpaisarn
M. Anwar Hasan
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security
332(23)
Xiaohui Ding
Muhammed F. Esgin
Amin Sakzad
Ron Steinfeld Cryptographic Protocols
Verifiable Decryption in the Head
355(20)
Kristian Gjøsteen
Thomas Haines
Johannes Miiller
Peter Rønne
Tjerand Slide
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
375(24)
Handong Zhang
Puwen Wei
Haiyang Xue
Yi Deng
Jinsong Li
Wei Wang
Guoxiao Liu
On Security of Fuzzy Commitment Scheme for Biometric Authentication
399(21)
Donghoon Chang
Surabhi Garg
Munawar Hasan
Sweta Mishra
SoK: Decentralized Randomness Beacon Protocols
420(29)
Mayank Raikwar
Danilo Gligoroski
Blockchain
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts
449(20)
Xiaofei Wu
Hao Wang
Chunpeng Ge
Lu Zhou
Qiong Huang
Lanju Kong
Lizhen Cui
Zhe Liu
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding
469(20)
Shenwei Chen
Zhen Liu
Yu Long
Dawu Gu
Garrison: A Novel Watchtower Scheme for Bitcoin
489(20)
Arash Mirzaei
Amin Sakzad
Jiangshan Yu
Ron Steinfeld
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics
509(20)
Chen Zhao
Jianing Ding
Zhenzhen Li
Zhen Li
Gang Xiong
Gaopeng Gou
Author Index 529