Information Security and Cryptology - ICISC 2022 [E-Book] : 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers / edited by Seung-Hyun Seo, Hwajeong Seo.
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30-December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections...
Saved in:
Full text |
|
Personal Name(s): | Seo, Hwajeong, editor |
Seo, Seung-Hyun, editor | |
Edition: |
1st edition 2023. |
Imprint: |
Cham :
Springer,
2023
|
Physical Description: |
XI, 514 pages 115 illustrations, 64 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031293719 |
DOI: |
10.1007/978-3-031-29371-9 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Computer Science ;
13849 |
Subject (LOC): |
LEADER | 04327nam a22004695i 4500 | ||
---|---|---|---|
001 | 978-3-031-29371-9 | ||
003 | Springer | ||
008 | 230330s2023 sz | s |||| 0|eng d | ||
020 | |a 9783031293719 | ||
024 | 7 | |a 10.1007/978-3-031-29371-9 |2 doi | |
035 | |a (Sirsi) a872632 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |2 23 |
245 | 1 | 0 | |a Information Security and Cryptology - ICISC 2022 |h [E-Book] : |b 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers / |c edited by Seung-Hyun Seo, Hwajeong Seo. |
250 | |a 1st edition 2023. | ||
264 | 1 | |a Cham : |b Springer, |c 2023 |e (Springer LINK) |f SpringerLectureNotes20230711 | |
300 | |a XI, 514 pages 115 illustrations, 64 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a Lecture Notes in Computer Science ; |v 13849 | ||
500 | |a englisch | ||
505 | 0 | |a Cryptanalysis -- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT -- Implicit Key-stretching Security of Encryption Schemes -- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures -- Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore -- Cyber Security -- Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception -- Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems -- Differential Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery -- Fault and Side-Channel Attack -- Key recovery by side-channel information on the matrix-vector product in code-based cryptosystems -- Differential Fault Attack on AES using Maximum Four Bytes Faulty Ciphertexts -- Efficient Implementation -- A Performance Evaluation of IPsec with Post-Quantum Cryptography -- An Ultrafast Cryptographically Secure Pseudorandom Number Generator -- Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 -- Signature Schemes -- Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature -- Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding -- Group Testing Aggregate Signatures with Soundness -- Attribute-Based Signatures for Range of Inner Product and Its Applications -- Identity-based Interactive Aggregate Signatures from Lattices -- Post-Quantum Cryptography -- Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary Fields -- A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations -- Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler -- WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership. | |
520 | |a This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30-December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes. | ||
650 | 0 | |a Application software. | |
650 | 0 | |a Computer networks . | |
650 | 0 | |a Computer systems. | |
650 | 0 | |a Computers, Special purpose. | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Data structures (Computer science). | |
650 | 0 | |a Information theory. | |
700 | 1 | |a Seo, Hwajeong, |e editor | |
700 | 1 | |a Seo, Seung-Hyun, |e editor | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-29371-9 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
596 | |a 1 | ||
949 | |a XX(872632.1) |w AUTO |c 1 |i 872632-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 11/7/2023 |x ZB-D |z UNKNOWN |0 NEL |1 ONLINE |2 KONFERENZ |