소장자료
LDR | 05021nam a22006495i 4500 | ||
001 | 0100794129▲ | ||
003 | DE-He213▲ | ||
005 | 20240305113543▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 230218s2023 sz | s |||| 0|eng d▲ | ||
020 | ▼a9783031265532▼9978-3-031-26553-2▲ | ||
024 | 7 | ▼a10.1007/978-3-031-26553-2▼2doi▲ | |
050 | 4 | ▼aQA76.9.A25▲ | |
082 | 0 | 4 | ▼a005.8▼223▲ |
245 | 1 | 0 | ▼aInformation Security and Cryptology▼h[electronic resource] :▼b18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers /▼cedited by Yi Deng, Moti Yung.▲ |
250 | ▼a1st ed. 2023.▲ | ||
264 | 1 | ▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2023.▲ | |
300 | ▼aX, 496 p. 118 illus., 70 illus. in color.▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v13837▲ | |
505 | 0 | ▼aBlock Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.▲ | |
520 | ▼aThis book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.▲ | ||
650 | 0 | ▼aData protection.▲ | |
650 | 0 | ▼aImage processing▼xDigital techniques.▲ | |
650 | 0 | ▼aComputer vision.▲ | |
650 | 0 | ▼aComputer networks .▲ | |
650 | 0 | ▼aApplication software.▲ | |
650 | 0 | ▼aComputer networks▼xSecurity measures.▲ | |
650 | 0 | ▼aCryptography.▲ | |
650 | 0 | ▼aData encryption (Computer science).▲ | |
650 | 1 | 4 | ▼aData and Information Security.▲ |
650 | 2 | 4 | ▼aComputer Imaging, Vision, Pattern Recognition and Graphics.▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▲ |
650 | 2 | 4 | ▼aComputer and Information Systems Applications.▲ |
650 | 2 | 4 | ▼aMobile and Network Security.▲ |
650 | 2 | 4 | ▼aCryptology.▲ |
700 | 1 | ▼aDeng, Yi.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aYung, Moti.▼eeditor.▼0(orcid)0000-0003-0848-0873▼1https://orcid.org/0000-0003-0848-0873▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031265525▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031265549▲ |
830 | 0 | ▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v13837▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-3-031-26553-2▲ |

Information Security and Cryptology[electronic resource] : 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers
자료유형
국외eBook
서명/책임사항
Information Security and Cryptology [electronic resource] : 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers / edited by Yi Deng, Moti Yung.
판사항
1st ed. 2023.
형태사항
X, 496 p. 118 illus., 70 illus. in color. online resource.
총서사항
Lecture Notes in Computer Science , 1611-3349 ; 13837
Lecture Notes in Computer Science , 1611-3349 ; 13837
Lecture Notes in Computer Science , 1611-3349 ; 13837
내용주기
Block Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.
요약주기
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
주제
Data protection.
Image processing, Digital techniques.
Computer vision.
Computer networks .
Application software.
Computer networks, Security measures.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Computer Communication Networks.
Computer and Information Systems Applications.
Mobile and Network Security.
Cryptology.
Image processing, Digital techniques.
Computer vision.
Computer networks .
Application software.
Computer networks, Security measures.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Computer Communication Networks.
Computer and Information Systems Applications.
Mobile and Network Security.
Cryptology.
ISBN
9783031265532
관련 인기대출 도서