Information Security and Cryptology : 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Information Security and Cryptology : 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 496 p.
  • 言語 ENG
  • 商品コード 9783031265525
  • DDC分類 005.82

Full Description

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. 
The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.

Contents

​Block Ciphers.- Best Paper: How Fast Can SM4 Be in Software?.- LLLWBC: A New Low-Latency Light-Weight Block Cipher.- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits.- Public key Encryption & Signature.- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.- McEliece-type encryption based on Gabidulin codes with no hidden structure.- Quantum.- Optimizing the depth of quantum implementations of linear layers.- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.- MPC.- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.-  Amortizing Division and Exponentiation.- Cryptanalysis.- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.- Cryptanalysis of Ciminion.- Clustering Effect of Iterative Differential and Linear Trails.- Differential Cryptanalysis of Round-reduced SPEEDY Family.- Mathematical aspects of Crypto.- A note on inverted twisted Edwards curve.- Efficiently Computable Complex Multiplication of Elliptic Curves.- Several classes of Niho type Boolean functions with few Walsh transform values.- Stream ciphers.- Higher-Order Masking Scheme for Trivium Hardware Implementation.- An Experimentally Verified Attack on 820-Round Trivium.- Malware.- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.- Efficient DNN Backdoor Detection Guided by Static Weight Analysis.- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans.- Lattices.- Subfield Attacks on HSVP in Ideal Lattices.- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.- Inferring Sequences Produced by the Quadratic Generator.

最近チェックした商品