Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

個数:
  • 予約

Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 382 p.
  • 言語 ENG
  • 商品コード 9789819690947

Full Description

This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14-16, 2025.

The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and
selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.

Contents

.- Symmetric-Key Cryptography and Cryptanalysis.

.- Forgery Attacks on SipHash.

.- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities.

.- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.

.- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri.

.- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo.

.- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.

.- Public-Key Encryption.

.- Ideal Transformations for Public Key Encryption.

.- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection.

.- Digital Signatures and Zero Knowledge.

.- Compressed Sigma Protocols: New Model and Aggregation Techniques.

.- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.

.- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree.

.- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.

.- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.

.- Cryptographic Protocols and Blockchain.

.- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.

.- TEAKEX: TESLA-Authenticated Group Key Exchange.

.- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.

.- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.

.- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.

.- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.

最近チェックした商品