Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advances in information and computer...
~
International Workshop on Security (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Advances in information and computer security = 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Advances in information and computer security/ edited by Junji Shikata, Hiroki Kuzuno.
Reminder of title:
18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /
remainder title:
IWSEC 2023
other author:
Shikata, Junji.
corporate name:
International Workshop on Security
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
xii, 274 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
System and Hardware Security/ -- Power analysis pushed too far: breaking Android-based isolation with fuel gauges -- The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis -- Reliability of Ring Oscillator PUFs with Reduced Helper Data -- Symmetric Key Cryptography -- Improved Boomerang Attacks on Deoxys-BC -- PMACrx: a vector-input MAC for high-dimensional vectors with BBB security -- Public Key Cryptography 1 -- A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack -- Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors -- Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials -- Public Key Cryptography 2 -- Extractable Witness Encryption for the Homogeneous Linear Equation problem -- Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger -- Zero Knowledge Proofs -- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes -- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup -- Card Based Cryptography -- Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding -- Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-41326-1
ISBN:
9783031413261
Advances in information and computer security = 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /
Advances in information and computer security
18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /[electronic resource] :IWSEC 2023edited by Junji Shikata, Hiroki Kuzuno. - Cham :Springer Nature Switzerland :2023. - xii, 274 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,141280302-9743 ;. - Lecture notes in computer science ;14128..
System and Hardware Security/ -- Power analysis pushed too far: breaking Android-based isolation with fuel gauges -- The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis -- Reliability of Ring Oscillator PUFs with Reduced Helper Data -- Symmetric Key Cryptography -- Improved Boomerang Attacks on Deoxys-BC -- PMACrx: a vector-input MAC for high-dimensional vectors with BBB security -- Public Key Cryptography 1 -- A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack -- Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors -- Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials -- Public Key Cryptography 2 -- Extractable Witness Encryption for the Homogeneous Linear Equation problem -- Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger -- Zero Knowledge Proofs -- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes -- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup -- Card Based Cryptography -- Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding -- Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
ISBN: 9783031413261
Standard No.: 10.1007/978-3-031-41326-1doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advances in information and computer security = 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /
LDR
:03066nmm a2200373 a 4500
001
2333698
003
DE-He213
005
20230823220018.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031413261
$q
(electronic bk.)
020
$a
9783031413254
$q
(paper)
024
7
$a
10.1007/978-3-031-41326-1
$2
doi
035
$a
978-3-031-41326-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2023
111
2
$a
International Workshop on Security
$n
(18th :
$d
2023 :
$c
Yokohama-shi, Japan ; Online)
$3
3664652
245
1 0
$a
Advances in information and computer security
$h
[electronic resource] :
$b
18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023 : proceedings /
$c
edited by Junji Shikata, Hiroki Kuzuno.
246
3
$a
IWSEC 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xii, 274 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14128
505
0
$a
System and Hardware Security/ -- Power analysis pushed too far: breaking Android-based isolation with fuel gauges -- The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis -- Reliability of Ring Oscillator PUFs with Reduced Helper Data -- Symmetric Key Cryptography -- Improved Boomerang Attacks on Deoxys-BC -- PMACrx: a vector-input MAC for high-dimensional vectors with BBB security -- Public Key Cryptography 1 -- A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack -- Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors -- Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials -- Public Key Cryptography 2 -- Extractable Witness Encryption for the Homogeneous Linear Equation problem -- Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger -- Zero Knowledge Proofs -- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes -- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup -- Card Based Cryptography -- Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding -- Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
520
$a
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Shikata, Junji.
$3
3269960
700
1
$a
Kuzuno, Hiroki.
$3
3664653
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14128.
$3
3664654
856
4 0
$u
https://doi.org/10.1007/978-3-031-41326-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9459903
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login