Information Security and Privacy
Springer Nature (Verlag)
978-981-97-5027-6 (ISBN)
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.
Erscheinungsdatum | 17.07.2024 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | 58 Illustrations, color; 37 Illustrations, black and white; XIII, 456 p. 95 illus., 58 illus. in color. |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | AI Security • Applications • application security • Blockchain technology • Computer Science • conference proceedings • Cryptanalysis • cryptographic primitives • Digital Signatures • Encryption • Informatics • Network Security • post-quantum cryptography • Privacy-Enhancing Technologies • Research • Secure Protocols • Symmetric-Key Cryptography • System Security |
ISBN-10 | 981-97-5027-X / 981975027X |
ISBN-13 | 978-981-97-5027-6 / 9789819750276 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich