Atjaunināt sīkdatņu piekrišanu

Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 1416, 2025, Proceedings, Part I [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 396 pages, height x width: 235x155 mm, 44 Illustrations, color; 44 Illustrations, black and white; XIX, 396 p. 88 illus., 44 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15658
  • Izdošanas datums: 08-Jul-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819690943
  • ISBN-13: 9789819690947
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 75,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 88,79 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 396 pages, height x width: 235x155 mm, 44 Illustrations, color; 44 Illustrations, black and white; XIX, 396 p. 88 illus., 44 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15658
  • Izdošanas datums: 08-Jul-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819690943
  • ISBN-13: 9789819690947
Citas grāmatas par šo tēmu:
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 1416, 2025.



The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
.- Symmetric-Key Cryptography and Cryptanalysis.


.- Forgery Attacks on SipHash.


.- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial
ization Vulnerabilities.


.- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4
and Their Performance in Differential Attacks.


.- Inner Product Masked Integral Distinguishers and Integral Sets over
Large Finite Fields Applications to MiMC, CIMINION and Chaghri.


.- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON
and Piccolo.


.- Strengthening Key Scheduling of AES-256 with Minimal Software
Modifications.


.- Public-Key Encryption.


.- Ideal Transformations for Public Key Encryption.


.- Indifferentiability Separations in Ideal Public Key Encryption: Explicit
vs Implicit Rejection.


.- Digital Signatures and Zero Knowledge.


.- Compressed Sigma Protocols: New Model and Aggregation Techniques.


.- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.


.- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half
Tree.


.- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.


.- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures
and Breaking the Information-Theoretic Limit.


.- Cryptographic Protocols and Blockchain.


.- FlexiADKG: A Flexible Asynchronous Distributed Key Generation
Protocol with Constant Round Complexity.


.- TEAKEX: TESLA-Authenticated Group Key Exchange.


.- SoK: A Deep Dive into Anti-Money Laundering Techniques for
Blockchain Cryptocurrencies.


.- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on
Complex Blockchain Transactional Networks.


.- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.


.- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among
Multiple Blockchains Based on Parent-Child Blockchain.