Advances in Information and Computer Security : 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings (Lecture Notes in Computer Science)

個数:

Advances in Information and Computer Security : 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 274 p.
  • 商品コード 9783031413254

Full Description

This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode.

The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.

Contents

​System and Hardware Security/.- Power analysis pushed too far: breaking Android-based isolation with fuel gauges.- The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.- Reliability of Ring Oscillator PUFs with Reduced Helper Data.- Symmetric Key Cryptography.- Improved Boomerang Attacks on Deoxys-BC.- PMACrx: a vector-input MAC for high-dimensional vectors with BBB security.- Public Key Cryptography 1.- A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack.- Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors.- Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.- Public Key Cryptography 2.- Extractable Witness Encryption for the Homogeneous Linear Equation problem.- Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger.- Zero Knowledge Proofs.- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes.- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup.- Card Based Cryptography.- Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding.- Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.

最近チェックした商品