Information Security and Cryptology : 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

個数:

Information Security and Cryptology : 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 440 p.
  • 言語 ENG
  • 商品コード 9789819647330

Full Description

The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024.
 
The 47 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections:
 
Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking.
 
Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.

Contents

.- Public Key Cryptosystems.

.- Extended Policy-based Sanitizable Signatures.

.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations.

.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage.

.- Generalized Cryptanalysis of Cubic Pell RSA.

.- On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.

.- Hierarchical Functional Encryption for Quadratic Transformation.

.- Solving Modular Linear Equations via Automated Coppersmith and its Applications.

.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.

.- Security Protocols Analysis.

.- Permutation Argument via Bases Transformation.

.- Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage.

.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.

.- Symmetric Cryptanalysis. 

.- Committing Security of AEAD Based on Stream Cipher.

.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method.

.- Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity..

.- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers.

.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.

.- An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously.

.-  Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.

.- Cryptanalysis of BAKSHEESH Block Cipher.

.- Quantum and Post Quantum Cryptography. 

.- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack.

.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE.

.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON.

.- Quantum Public-Key Encryption of Quantum States, and More.

最近チェックした商品