Information security and privacy = 2...
ACISP (Conference) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and privacy/ edited by Tianqing Zhu, Yannan Li.
    Reminder of title: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024 : proceedings.
    remainder title: ACISP 2024
    other author: Zhu, Tianqing.
    corporate name: ACISP (Conference)
    Published: Singapore :Springer Nature Singapore : : 2024.,
    Description: xiii, 456 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Post Quantum Cryptography -- Improved Multimodal Private Signatures from Lattices -- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based more general anti leakage model and its application in decentralization -- An Efficient Hardware Implementation of Crystal Dilithium on FPGA -- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime -- Jumping for Berstein Yang Inversion -- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs -- Faster verifications and smaller signatures Trade offs for Alteq using rejections -- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks -- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem -- Cryptanalysis -- New Strategy for Evaluating Differential Clustering Effect of uBlock -- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2 -- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack -- Secure Protocols -- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System -- Formal Verification of Challenge Flow in EMV 3D Secure -- Size Hiding Computation in the Honest But Curious Model -- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation -- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation -- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA -- Application Security -- Deep Dive on Relationship between Personality and Password Creation -- Unveiling the Unseen Video Recognition Attacks on Social Software -- An Account Matching Method Based on Hyper Graph.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-97-5028-3
    ISBN: 9789819750283
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login