Information security and cryptology ...
ICISC (Conference) (2021 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology - ICISC 2021 = 24th International Conference, Seoul, South Korea, December 1-3, 2021 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and cryptology - ICISC 2021/ edited by Jong Hwan Park, Seung-Hyun Seo.
    Reminder of title: 24th International Conference, Seoul, South Korea, December 1-3, 2021 : revised selected papers /
    remainder title: ICISC 2021
    other author: Park, Jong Hwan.
    corporate name: ICISC (Conference)
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xi, 446 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Cryptographic Protocol in Quantum Computer Age -- Security Analysis of Hash Algorithm -- Security analysis of Symmetric Key Encryption Algorithm -- Fault and Side-Channel Attack; Constructions and Designs -- Quantum Circuit -- Efficient Implementation -- Cryptographic Protocol I Revocable Hierarchical Identity-Based Authenticated Key Exchange -- Towards Witness Encryption Without Multilinear Maps -- Designated-Verifier Linkable Ring Signatures -- ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability -- Cryptographic Protocol in Quantum Computer Age Delegating Supersingular Isogenies over Fp2 with Cryptographic Applications -- Improved Lattice-Based Mix-Nets for Electronic Voting -- Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice -- Security Analysis Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods -- Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis -- Security Analysis of Hash Algorithm Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems -- A Preimage Attack on Reduced Gimli-Hash -- Security analysis of Symmetric Key Encryption Algorithm Algebraic Attacks on Grain-like Keystream Generators -- Improved See-In-The-Middle Attacks on AES -- Fault and Side-Channel Attack Differential Fault Attack on Rocca -- Differential Fault Attack on Lightweight Block Cipher PIPO -- Learning-based Side-Channel Analysis on PIPO -- Constructions and Designs Collision-Resistant and Pseudorandom Function Based on Merkle-Damgard Hash Function -- Forward Secure Message Franking -- New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems -- Quantum Circuit T-depth reduction method for efficient SHA-256 quantum circuit construction.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-08896-4
    ISBN: 9783031088964
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9444047 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 I35 2021 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login