000 05147nam a22006495i 4500
001 978-3-031-29371-9
003 DE-He213
005 20240730181014.0
007 cr nn 008mamaa
008 230330s2023 sz | s |||| 0|eng d
020 _a9783031293719
_9978-3-031-29371-9
024 7 _a10.1007/978-3-031-29371-9
_2doi
050 4 _aQA76.5-.73
072 7 _aUYQE
_2bicssc
072 7 _aCOM011000
_2bisacsh
072 7 _aUYQE
_2thema
082 0 4 _a004
_223
245 1 0 _aInformation Security and Cryptology - ICISC 2022
_h[electronic resource] :
_b25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers /
_cedited by Seung-Hyun Seo, Hwajeong Seo.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXI, 514 p. 115 illus., 64 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13849
505 0 _aCryptanalysis -- See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT -- Implicit Key-stretching Security of Encryption Schemes -- Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures -- Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore -- Cyber Security -- Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception -- Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems -- Differential Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery -- Fault and Side-Channel Attack -- Key recovery by side-channel information on the matrix-vector product in code-based cryptosystems -- Differential Fault Attack on AES using Maximum Four Bytes Faulty Ciphertexts -- Efficient Implementation -- A Performance Evaluation of IPsec with Post-Quantum Cryptography -- An Ultrafast Cryptographically Secure Pseudorandom Number Generator -- Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 -- Signature Schemes -- Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature -- Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding -- Group Testing Aggregate Signatures with Soundness -- Attribute-Based Signatures for Range of Inner Product and Its Applications -- Identity-based Interactive Aggregate Signatures from Lattices -- Post-Quantum Cryptography -- Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary Fields -- A Message RecoveryAttack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations -- Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler -- WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership.
520 _aThis book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30-December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.
650 0 _aComputers, Special purpose.
_946653
650 0 _aComputer networks .
_931572
650 0 _aComputer systems.
_9122928
650 0 _aApplication software.
_9122929
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aSpecial Purpose and Application-Based Systems.
_946654
650 2 4 _aComputer Communication Networks.
_9122930
650 2 4 _aComputer System Implementation.
_938514
650 2 4 _aComputer and Information Systems Applications.
_9122931
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aCryptology.
_931769
700 1 _aSeo, Seung-Hyun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122932
700 1 _aSeo, Hwajeong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122933
710 2 _aSpringerLink (Online service)
_9122934
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031293702
776 0 8 _iPrinted edition:
_z9783031293726
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13849
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-29371-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90637
_d90637