000 | 04474nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-981-97-5025-2 | ||
003 | DE-He213 | ||
005 | 20240730172818.0 | ||
007 | cr nn 008mamaa | ||
008 | 240715s2024 si | s |||| 0|eng d | ||
020 |
_a9789819750252 _9978-981-97-5025-2 |
||
024 | 7 |
_a10.1007/978-981-97-5025-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security and Privacy _h[electronic resource] : _b29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I / _cedited by Tianqing Zhu, Yannan Li. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXXI, 496 p. 61 illus., 27 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14895 |
|
505 | 0 | _aSymmetric Key Cryptography -- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher -- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- Tight Multi user Security of Ascon and Its Large Key Extension -- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2 -- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures -- Homomorphic Encryption -- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping -- NTRU based FHE for Larger Key and Message Space -- An Efficient Integer-wise ReLU on TFHE -- HERatio Homomorphic Encryption of Rationals using Laurent polynomials -- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs -- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption -- Encryption and its Applications -- Key Cooperative Attribute-Based Encryption -- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks -- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy -- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives -- Continuous Version of Non malleable Codes from Authenticated Encryption -- Digital Signatures -- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM -- Threshold Ring Signatures with Accountability -- Threshold Signatures with Private Accountability via Secretly Designated Witnesses -- Cryptographic Primitives -- A Novel Window τ NAF on Koblitz Curves -- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets -- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective -- Hadamard product argument from Lagrange-based univariate polynomials. | |
520 | _aThis volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aZhu, Tianqing. _eeditor. _0(orcid) _10000-0003-3411-7947 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105601 |
|
700 | 1 |
_aLi, Yannan. _eeditor. _0(orcid) _10000-0002-4407-9027 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105604 |
|
710 | 2 |
_aSpringerLink (Online service) _9105608 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819750245 |
776 | 0 | 8 |
_iPrinted edition: _z9789819750269 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14895 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-97-5025-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c88571 _d88571 |