Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I

Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 130,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 1517, 2024. 





The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular
Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and
GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block
Ciphers without Whitening Key Addition against Integral Distinguishers.- On
the Security Bounds for Block Ciphers without Whitening Key Addition against
Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large
Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and
KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII
Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High
Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU
based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU
on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent
polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.-
Approximate Methods for the Computation of Step Functions in Homomorphic
Encryption.- Encryption and its Applications.- Key Cooperative
Attribute-Based Encryption.- On the Feasibility of Identity based Encryption
with Equality Test against Insider Attacks.- Non interactive Publicly
Verifiable Searchable Encryption with Forward and Backward Privacy.- On the
Implication from Updatable Encryption to Public Key Cryptographic
Primitives.- Continuous Version of Non malleable Codes from Authenticated
Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure
as Discrete Logarithm in AGM.- Threshold Ring Signatures with
Accountability.- Threshold Signatures with Private Accountability via
Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window
NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using
Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential
Trails from an Algebraic Perspective.- Hadamard product argument from
Lagrange-based univariate polynomials.