- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024.
The 47 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:
Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.
Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
Contents
.- Public Key Cryptosystems.
.- Extended Policy-based Sanitizable Signatures.
.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations.
.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage.
.- Generalized Cryptanalysis of Cubic Pell RSA.
.- On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.
.- Hierarchical Functional Encryption for Quadratic Transformation.
.- Solving Modular Linear Equations via Automated Coppersmith and its Applications.
.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.
.- Security Protocols Analysis.
.- Permutation Argument via Bases Transformation.
.- Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage.
.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.
.- Symmetric Cryptanalysis.
.- Committing Security of AEAD Based on Stream Cipher.
.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method.
.- Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity..
.- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers.
.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
.- An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously.
.- Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.
.- Cryptanalysis of BAKSHEESH Block Cipher.
.- Quantum and Post Quantum Cryptography.
.- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack.
.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE.
.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON.
.- Quantum Public-Key Encryption of Quantum States, and More.