Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

個数:
  • 予約

Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 579 p.
  • 言語 ENG
  • 商品コード 9789819562053

Full Description

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.

The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections:
 
Part I :  Post-Quantum Cryptography; Functional Encryption;  Cryptanalysis and Implementations I; Cryptanalysis and Implementations II.
 
Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models;  Network Security & Traffic Analysis.
 
Part III : Privacy Preserving/Enhancing Technologies;  AI and Security I; AI and Security II.

Contents

.- Post-Quantum Cryptography.
.-  Further Research on Meet-LWE and Its Application to Weakened Kyber.
.-  Efficient Implementation of Post-Quantum Signature Algorithms for Next Generation of Blockchains.
.-  Accelerating NTRU-based Bootstrapping with Block Key Distributions.
.-  Lattice IBE from Non-spherical Gaussian Sampling with Tight Security.
.-  Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE.
.- An Area-Performance Balanced Hardware Accelerator of NTT for Kyber.
.-  A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation.
.- Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model.
.- Speedy Error Reconciliation.
.-  Functional Encryption.
.-  A Note on the Simpler Construction to Achieve Dynamic FE via IBE.
.-  Onion Encryption Revisited: Relations Among Security Notions.
.-  New Key Combiner Schemes for Multiple Keys.
.-   Wildcarded Identity-Based Inner Product Encryption Based on SM9.
.- Dual-Threshold Verifiable Witness Encryption for Signatures and its Applications.
.- Cryptanalysis and Implementations I.
.- Improved Quantum Cryptanalysis on Generalized Feistel Structure.
.-  Algebraic Cryptanalysis on Reduced-round Trivium-LE.
.-  Automated Periodic Distinguisher Search for AND-RX Ciphers.
.-  Efficient Reconstruction of S-boxes from Partial Cryptographic Tables via MILP Modeling.
.- Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification.
.- Arithmetic Autocorrelation of Certain Binary Half-ℓ-sequences.
.-  Related-Key Rectangle Attacks on Round-Reduced TWINE.
.-  TwoLayerF: A Two-Layer Framework of PNB-based Key Recovery Attacks on ChaCha.
.-  Exploring AI-Assisted Cryptanalytic Attacks on Multisets.
.-  Distributed Quantum Key Recovery Attack on Pseudorandom Functions.
.- Cryptanalysis and Implementations II.
.-  An Area-Efficient Design of ZUC-256 Through Hardware Optimization.
.- Revisit Bitslice Implementation of Dummy Shuffling.
.- TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation.
.- Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset.
.-  Bit-by-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation.
.-  Multi-feature Fusion Leakage Abuse Attacks against Dynamic Searchable Symmetric Encryption.
.- A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack against Kyber.

最近チェックした商品