Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I (Lecture Notes in Computer Science) (2024)

個数:

Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I (Lecture Notes in Computer Science) (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 496 p.
  • 言語 ENG
  • 商品コード 9789819750245
  • DDC分類 005.8

Full Description

This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024. 

The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.

Contents

Symmetric Key Cryptography.- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers.- Tight Multi user Security of Ascon and Its Large Key Extension.- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2.- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures.- Homomorphic Encryption.- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping.- NTRU based FHE for Larger Key and Message Space.- An Efficient Integer-wise ReLU on TFHE.- HERatio Homomorphic Encryption of Rationals using Laurent polynomials.- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs.- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.- Encryption and its Applications.- Key Cooperative Attribute-Based Encryption.- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks.- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives.- Continuous Version of Non malleable Codes from Authenticated Encryption.- Digital Signatures.- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM.- Threshold Ring Signatures with Accountability.- Threshold Signatures with Private Accountability via Secretly Designated Witnesses.- Cryptographic Primitives.- A Novel Window τ NAF on Koblitz Curves.- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets.- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective.- Hadamard product argument from Lagrange-based univariate polynomials.

最近チェックした商品