Information Security and Cryptology - ICISC 2025 : 28th International Conference, Seoul, South Korea, November 19-21, 2025, Revised Selected Papers (Lecture Notes in Computer Science)

個数:
  • 予約
  • ポイントキャンペーン

Information Security and Cryptology - ICISC 2025 : 28th International Conference, Seoul, South Korea, November 19-21, 2025, Revised Selected Papers (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 530 p.
  • 言語 ENG
  • 商品コード 9789819580330

Full Description

This book constitutes the refereed proceedings of the 28th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2025, held in Seoul, South Korea, during November 19-21, 2025.

The 28 full papers included in this book were carefully reviewed and selected from 74 submissions.They were organized in topical sections as follows:AI-Driven Threat Detection & Federated Learning; Generative & Steganographic Security Applications; Post-Quantum Cryptography & Migration; Side-Channel & Fault Analysis in PQC; Network & Application Security; Quantum Cryptanalysis & Theoretical Limits; Implementation & Hardware Acceleration; Symmetric Cryptanalysis & New Constructions; Advanced Cryptographic Protocols & Signatures.

Contents

.- AI-Driven Threat Detection & Federated Learning.
.- Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages.
.- Tabular or Image Input? Transformers for NIDS: A Comparative Study.
.- AdvCodeGen: Adversarial Code Generation via Large Language Models.
.- Generative & Steganographic Security Applications.
.- Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification.
.- Improving Scalable Clustering for IoT Malware via Code Region Extraction.
.- PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies.
.- Post-Quantum Cryptography & Migration.
.- Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach.
.- On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment.
.- Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption.
.- Side-Channel & Fault Analysis in PQC.
.- Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method.
.- Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion.
.- Quantum Circuit Implementation and Resource Analysis of AIM2.
.- Network & Application Security.
.- Comprehensive Security Analysis of End-to-End Encryption in LINE.
.- Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection.
.- Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function.
.- Quantum Cryptanalysis & Theoretical Limits.
.- Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare.
.- Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256.
.- Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function.
.- Impossibility Results of Card-Based Protocols via Mathematical Optimization.
.- Implementation & Hardware Acceleration.
.- High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers.
.- Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU.
.- Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation.
.- Symmetric Cryptanalysis & New Constructions.
.- On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks.
.- On the Weak Differential Resistance of MGFN and the Exploration of Variants.
.- New Derivation Rule for Linear Approximations and Its Application to ChaCha.
.- Advanced Cryptographic Protocols & Signatures.
.- Strong Designated Verifier Signatures with Non-delegatability from CSIDH.
.- An Undeniable Signature Scheme Utilizing Module Lattices.
.- A Witness Encryption for Quadratic Arithmetic Programs.

最近チェックした商品