My Account Log in

1 option

Information Security and Cryptology – ICISC 2022 : 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers / edited by Seung-Hyun Seo, Hwajeong Seo.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Seo, Seung-Hyun, editor.
Seo, Hwajeong, editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13849
Language:
English
Subjects (All):
Computers, Special purpose.
Computer networks.
Computer systems.
Application software.
Data structures (Computer science).
Information theory.
Cryptography.
Data encryption (Computer science).
Special Purpose and Application-Based Systems.
Computer Communication Networks.
Computer System Implementation.
Computer and Information Systems Applications.
Data Structures and Information Theory.
Cryptology.
Local Subjects:
Special Purpose and Application-Based Systems.
Computer Communication Networks.
Computer System Implementation.
Computer and Information Systems Applications.
Data Structures and Information Theory.
Cryptology.
Physical Description:
1 online resource (514 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
Summary:
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.
Contents:
Cryptanalysis
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT
Implicit Key-stretching Security of Encryption Schemes
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore
Cyber Security
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing
Applied Cryptography
Public Key Encryption with Hierarchical Authorized Keyword Search
Private Evaluation of a Decision Tree based on Secret Sharing
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery
Fault and Side-Channel Attack
Key recovery by side-channel information on the matrix-vector product in code-based cryptosystems
Differential Fault Attack on AES using Maximum Four Bytes Faulty Ciphertexts
Efficient Implementation
A Performance Evaluation of IPsec with Post-Quantum Cryptography
An Ultrafast Cryptographically Secure Pseudorandom Number Generator
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4
Signature Schemes
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding
Group Testing Aggregate Signatures with Soundness
Attribute-Based Signatures for Range of Inner Product and Its Applications
Identity-based Interactive Aggregate Signatures from Lattices
Post-Quantum Cryptography
Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary Fields
A Message RecoveryAttack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations
Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler
WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership.
Notes:
Includes bibliographical references and index.
Other Format:
Print version: Seo, Seung-Hyun Information Security and Cryptology - ICISC 2022
ISBN:
9783031293719
OCLC:
1374875345

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account