Cryptology and Network Security : 24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings (Lecture Notes in Computer Science)

個数:
  • 予約
  • ポイントキャンペーン

Cryptology and Network Security : 24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 633 p.
  • 言語 ENG
  • 商品コード 9789819544332

Full Description

This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17-20, 2025.

The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.

Contents

.- Post-Quantum Cryptography.

.- Compressed verification for post-quantum signatures with long-term public keys.

.- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its
Application in NTRUReEncrypt.

.- Strong Designated Verifier Signatures from Isogeny Assumptions.

.- To extend or not to extend: Agile Masking Instructions for PQC.

.- Symmetric-Key Cryptography.

.- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation.

.- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs.

.- Computing the restricted algebraic immunity, and application to WPB functions.

.- Multi-Party Computation.

.- Efficient Fuzzy Labeled PSI from Vector Ring-OLE.

.- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with
Partial-Open Actions.

.- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle.

.- webSPDZ: Versatile MPC on the Web.

.- Advanced Encryption.

.- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption.

.- On the Relations between Matchmaking Public Key Encryption and Public Key
Authenticated Encryption with Keyword Search.

.- Faster FHEW Bootstrapping with Adaptive Key Update.

.- Cryptographic Protocols and Blockchain.

.- Attribute-based Key Exchange with Optimal Efficiency.

.- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity.

.- Decentralized Fair Exchange with Advertising.

.- Revisiting Rational Broadcast Protocols.

.- Vulnerability Detection.

.- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder.

.- Attention-based Code Summarization for Multi-label Vulnerability Detection.

.- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model.

.- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE
Mapping with LLMs.

.- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text.

.- Attacks.

.- Unveiling the critical attack path for implanting backdoors in supply chains:
Practical experience from XZ.

.- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach.

.- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns.

.- Short Papers.

.- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers.

.- DiSK: A Deniable Split KEM from The MLWE Problem.

.- A Key-Update Mechanism for the Space Data Link Security Protocol.

.- Automated Verification of Proofs in the Universal Composability Framework
with Markov Decision Processes.

.- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption.

.- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic.

.- Impossible Differential Attack on SAND-128.

 

 

最近チェックした商品