Information Security and Privacy -

Information Security and Privacy

29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II

Tianqing Zhu, Yannan Li (Herausgeber)

Buch | Softcover
456 Seiten
2024 | 2024 ed.
Springer Nature (Verlag)
978-981-97-5027-6 (ISBN)
79,17 inkl. MwSt
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.

This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024. 

The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security. 

Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo 58 Illustrations, color; 37 Illustrations, black and white; XIII, 456 p. 95 illus., 58 illus. in color.
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte AI Security • Applications • application security • Blockchain technology • Computer Science • conference proceedings • Cryptanalysis • cryptographic primitives • Digital Signatures • Encryption • Informatics • Network Security • post-quantum cryptography • Privacy-Enhancing Technologies • Research • Secure Protocols • Symmetric-Key Cryptography • System Security
ISBN-10 981-97-5027-X / 981975027X
ISBN-13 978-981-97-5027-6 / 9789819750276
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00