- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 27th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2024, held in Seoul, South Korea, during November 20-22, 2024.
The 23 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: cryptanalysis of block ciphers; signature schemes; applied cryptography; quantum cryptography and deep learning based analysis; side-channel and automotive attack; cyber security; and AI security.
Contents
.- Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.