000 05157nam a22006735i 4500
001 978-3-031-26553-2
003 DE-He213
005 20240730171925.0
007 cr nn 008mamaa
008 230218s2023 sz | s |||| 0|eng d
020 _a9783031265532
_9978-3-031-26553-2
024 7 _a10.1007/978-3-031-26553-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Security and Cryptology
_h[electronic resource] :
_b18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers /
_cedited by Yi Deng, Moti Yung.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aX, 496 p. 118 illus., 70 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13837
505 0 _aBlock Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.
520 _aThis book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
650 0 _aData protection.
_97245
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_9100924
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_9100927
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aComputer Communication Networks.
_9100928
650 2 4 _aComputer and Information Systems Applications.
_9100930
650 2 4 _aMobile and Network Security.
_933624
650 2 4 _aCryptology.
_931769
700 1 _aDeng, Yi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100931
700 1 _aYung, Moti.
_eeditor.
_0(orcid)
_10000-0003-0848-0873
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100933
710 2 _aSpringerLink (Online service)
_9100936
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031265525
776 0 8 _iPrinted edition:
_z9783031265549
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13837
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-26553-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87892
_d87892