Information security and privacy = 3...
ACISP (Conference) (2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and privacy/ edited by Willy Susilo, Josef Pieprzyk.
    Reminder of title: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.
    remainder title: ACISP 2025
    other author: Susilo, Willy.
    corporate name: ACISP (Conference)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xix, 396 p. :ill., digital ;24 cm.
    [NT 15003449]: Symmetric-Key Cryptography and Cryptanalysis. -- Forgery Attacks on SipHash. -- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities. -- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks. -- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri. -- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo. -- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications. -- Public-Key Encryption. -- Ideal Transformations for Public Key Encryption. -- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection. -- Digital Signatures and Zero Knowledge. -- Compressed Sigma Protocols: New Model and Aggregation Techniques. -- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature. -- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree. -- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption. -- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit. -- Cryptographic Protocols and Blockchain. -- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity. -- TEAKEX: TESLA-Authenticated Group Key Exchange. -- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies. -- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks. -- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols. -- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-96-9095-4
    ISBN: 9789819690954
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login