- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 28th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2025, held in Seoul, South Korea, during November 19-21, 2025.
The 28 full papers included in this book were carefully reviewed and selected from 74 submissions.They were organized in topical sections as follows:AI-Driven Threat Detection & Federated Learning; Generative & Steganographic Security Applications; Post-Quantum Cryptography & Migration; Side-Channel & Fault Analysis in PQC; Network & Application Security; Quantum Cryptanalysis & Theoretical Limits; Implementation & Hardware Acceleration; Symmetric Cryptanalysis & New Constructions; Advanced Cryptographic Protocols & Signatures.
Contents
.- AI-Driven Threat Detection & Federated Learning.
.- Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages.
.- Tabular or Image Input? Transformers for NIDS: A Comparative Study.
.- AdvCodeGen: Adversarial Code Generation via Large Language Models.
.- Generative & Steganographic Security Applications.
.- Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification.
.- Improving Scalable Clustering for IoT Malware via Code Region Extraction.
.- PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies.
.- Post-Quantum Cryptography & Migration.
.- Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach.
.- On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment.
.- Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption.
.- Side-Channel & Fault Analysis in PQC.
.- Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method.
.- Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion.
.- Quantum Circuit Implementation and Resource Analysis of AIM2.
.- Network & Application Security.
.- Comprehensive Security Analysis of End-to-End Encryption in LINE.
.- Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection.
.- Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function.
.- Quantum Cryptanalysis & Theoretical Limits.
.- Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare.
.- Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256.
.- Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function.
.- Impossibility Results of Card-Based Protocols via Mathematical Optimization.
.- Implementation & Hardware Acceleration.
.- High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers.
.- Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU.
.- Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation.
.- Symmetric Cryptanalysis & New Constructions.
.- On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks.
.- On the Weak Differential Resistance of MGFN and the Exploration of Variants.
.- New Derivation Rule for Linear Approximations and Its Application to ChaCha.
.- Advanced Cryptographic Protocols & Signatures.
.- Strong Designated Verifier Signatures with Non-delegatability from CSIDH.
.- An Undeniable Signature Scheme Utilizing Module Lattices.
.- A Witness Encryption for Quadratic Arithmetic Programs.



