Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Information and Computer Security -

Advances in Information and Computer Security

18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29–31, 2023, Proceedings

Junji Shikata, Hiroki Kuzuno (Herausgeber)

Buch | Softcover
XII, 274 Seiten
2023 | 1st ed. 2023
Springer International Publishing (Verlag)
978-3-031-41325-4 (ISBN)
CHF 86,85 inkl. MwSt

This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode.

The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.

System and Hardware Security/.- Power analysis pushed too far: breaking Android-based isolation with fuel gauges.- The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.- Reliability of Ring Oscillator PUFs with Reduced Helper Data.- Symmetric Key Cryptography.- Improved Boomerang Attacks on Deoxys-BC.- PMACrx: a vector-input MAC for high-dimensional vectors with BBB security.- Public Key Cryptography 1.- A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack.- Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors.- Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials.- Public Key Cryptography 2.- Extractable Witness Encryption for the Homogeneous Linear Equation problem.- Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger.- Zero Knowledge Proofs.- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment Schemes.- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup.- Card Based Cryptography.- Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding.- Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XII, 274 p. 51 illus., 22 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 444 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte authentication • computer crime • Computer Networks • Cryptanalysis • cryptography • Data Mining • Data Security • electronic document identification systems • Hash Functions • Information Theory • Intrusion Detection and Prevention • Network Protocols • Network Security • privacy • privacy preserving • Public Key Cryptography • Security Systems
ISBN-10 3-031-41325-3 / 3031413253
ISBN-13 978-3-031-41325-4 / 9783031413254
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20