Cryptology and Network Security
24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings
Herausgegeben:Kim, Yongdae; Miyaji, Atsuko; Tibouchi, Mehdi
Cryptology and Network Security
24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings
Herausgegeben:Kim, Yongdae; Miyaji, Atsuko; Tibouchi, Mehdi
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17 20, 2025.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
Andere Kunden interessierten sich auch für
- Giulio D'AgostinoData Security in Cloud Computing, Volume I35,99 €
- Giulio D'AgostinoData Security in Cloud Computing, Volume II36,99 €
- Elonka DuninCodebreaking22,99 €
- Josh DatkoBeaglebone for Secret Agents28,99 €
- ZeitgeistA-Z Password Book17,99 €
- Daryoush KabiriWie verändert das disruptive Innovationspotential der Blockchain-Technologien die Zukunft? Eine Analyse der Einsatzmöglichkeiten und Grenzen47,95 €
- National Security AgencyThe National Security Agency and The EC-121 Shootdown22,99 €
-
-
-
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17 20, 2025.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 16351
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89557775
- Seitenzahl: 651
- Erscheinungstermin: 17. Dezember 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9789819544332
- ISBN-10: 9819544335
- Artikelnr.: 75570956
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 16351
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89557775
- Seitenzahl: 651
- Erscheinungstermin: 17. Dezember 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9789819544332
- ISBN-10: 9819544335
- Artikelnr.: 75570956
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.
Post
Quantum Cryptography. .
Compressed verification for post
quantum signatures with long
term public keys. .
Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .
Strong Designated Verifier Signatures from Isogeny Assumptions. .
To extend or not to extend: Agile Masking Instructions for PQC. .
Symmetric
Key Cryptography. .
Comparing Gaston with Ascon
p: Side
Channel Analysis and Hardware Evaluation. .
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .
Computing the restricted algebraic immunity, and application to WPB functions. .
Multi
Party Computation. .
Efficient Fuzzy Labeled PSI from Vector Ring
OLE. .
Efficient Three
Input and Four
Input AND Protocols Using Playing Cards with Partial
Open Actions. .
Impossibility of Four
Card AND Protocols with a Single Closed Shuffle. .
webSPDZ: Versatile MPC on the Web. .
Advanced Encryption. .
Group Signatures with Message
Dependent Opening Directly Imply Timed Release Encryption. .
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .
Faster FHEW Bootstrapping with Adaptive Key Update. .
Cryptographic Protocols and Blockchain. .
Attribute
based Key Exchange with Optimal Efficiency. .
Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .
Decentralized Fair Exchange with Advertising. .
Revisiting Rational Broadcast Protocols. .
Vulnerability Detection. .
WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .
Attention
based Code Summarization for Multi
label Vulnerability Detection. .
Lanstree: Cross
Architecture Binary Code Similarity Detection with a Bidirec tional Tree
Structured Embedding Model. .
What Matters Most in Vulnerabilities? Key Term Extraction for CVE
to
CWE Mapping with LLMs. .
Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .
Attacks. .
Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .
Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .
Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .
Short Papers. .
Enhancing Cold Boot Attacks with Probabilistic
Guided SAT
Solvers. .
DiSK: A Deniable Split KEM from The MLWE Problem. .
A Key
Update Mechanism for the Space Data Link Security Protocol. .
Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .
Fully Verifiable Ciphertext
Policy Attribute
Based Encryption. .
Few
Shot Retrieval
Augmented LLMs for Anomaly Detection in Network Traffic. .
Impossible Differential Attack on SAND
128.
Post
Quantum Cryptography. .
Compressed verification for post
quantum signatures with long
term public keys. .
Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .
Strong Designated Verifier Signatures from Isogeny Assumptions. .
To extend or not to extend: Agile Masking Instructions for PQC. .
Symmetric
Key Cryptography. .
Comparing Gaston with Ascon
p: Side
Channel Analysis and Hardware Evaluation. .
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .
Computing the restricted algebraic immunity, and application to WPB functions. .
Multi
Party Computation. .
Efficient Fuzzy Labeled PSI from Vector Ring
OLE. .
Efficient Three
Input and Four
Input AND Protocols Using Playing Cards with Partial
Open Actions. .
Impossibility of Four
Card AND Protocols with a Single Closed Shuffle. .
webSPDZ: Versatile MPC on the Web. .
Advanced Encryption. .
Group Signatures with Message
Dependent Opening Directly Imply Timed Release Encryption. .
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .
Faster FHEW Bootstrapping with Adaptive Key Update. .
Cryptographic Protocols and Blockchain. .
Attribute
based Key Exchange with Optimal Efficiency. .
Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .
Decentralized Fair Exchange with Advertising. .
Revisiting Rational Broadcast Protocols. .
Vulnerability Detection. .
WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .
Attention
based Code Summarization for Multi
label Vulnerability Detection. .
Lanstree: Cross
Architecture Binary Code Similarity Detection with a Bidirec tional Tree
Structured Embedding Model. .
What Matters Most in Vulnerabilities? Key Term Extraction for CVE
to
CWE Mapping with LLMs. .
Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .
Attacks. .
Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .
Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .
Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .
Short Papers. .
Enhancing Cold Boot Attacks with Probabilistic
Guided SAT
Solvers. .
DiSK: A Deniable Split KEM from The MLWE Problem. .
A Key
Update Mechanism for the Space Data Link Security Protocol. .
Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .
Fully Verifiable Ciphertext
Policy Attribute
Based Encryption. .
Few
Shot Retrieval
Augmented LLMs for Anomaly Detection in Network Traffic. .
Impossible Differential Attack on SAND
128.
.
Post
Quantum Cryptography. .
Compressed verification for post
quantum signatures with long
term public keys. .
Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .
Strong Designated Verifier Signatures from Isogeny Assumptions. .
To extend or not to extend: Agile Masking Instructions for PQC. .
Symmetric
Key Cryptography. .
Comparing Gaston with Ascon
p: Side
Channel Analysis and Hardware Evaluation. .
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .
Computing the restricted algebraic immunity, and application to WPB functions. .
Multi
Party Computation. .
Efficient Fuzzy Labeled PSI from Vector Ring
OLE. .
Efficient Three
Input and Four
Input AND Protocols Using Playing Cards with Partial
Open Actions. .
Impossibility of Four
Card AND Protocols with a Single Closed Shuffle. .
webSPDZ: Versatile MPC on the Web. .
Advanced Encryption. .
Group Signatures with Message
Dependent Opening Directly Imply Timed Release Encryption. .
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .
Faster FHEW Bootstrapping with Adaptive Key Update. .
Cryptographic Protocols and Blockchain. .
Attribute
based Key Exchange with Optimal Efficiency. .
Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .
Decentralized Fair Exchange with Advertising. .
Revisiting Rational Broadcast Protocols. .
Vulnerability Detection. .
WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .
Attention
based Code Summarization for Multi
label Vulnerability Detection. .
Lanstree: Cross
Architecture Binary Code Similarity Detection with a Bidirec tional Tree
Structured Embedding Model. .
What Matters Most in Vulnerabilities? Key Term Extraction for CVE
to
CWE Mapping with LLMs. .
Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .
Attacks. .
Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .
Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .
Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .
Short Papers. .
Enhancing Cold Boot Attacks with Probabilistic
Guided SAT
Solvers. .
DiSK: A Deniable Split KEM from The MLWE Problem. .
A Key
Update Mechanism for the Space Data Link Security Protocol. .
Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .
Fully Verifiable Ciphertext
Policy Attribute
Based Encryption. .
Few
Shot Retrieval
Augmented LLMs for Anomaly Detection in Network Traffic. .
Impossible Differential Attack on SAND
128.
Post
Quantum Cryptography. .
Compressed verification for post
quantum signatures with long
term public keys. .
Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .
Strong Designated Verifier Signatures from Isogeny Assumptions. .
To extend or not to extend: Agile Masking Instructions for PQC. .
Symmetric
Key Cryptography. .
Comparing Gaston with Ascon
p: Side
Channel Analysis and Hardware Evaluation. .
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .
Computing the restricted algebraic immunity, and application to WPB functions. .
Multi
Party Computation. .
Efficient Fuzzy Labeled PSI from Vector Ring
OLE. .
Efficient Three
Input and Four
Input AND Protocols Using Playing Cards with Partial
Open Actions. .
Impossibility of Four
Card AND Protocols with a Single Closed Shuffle. .
webSPDZ: Versatile MPC on the Web. .
Advanced Encryption. .
Group Signatures with Message
Dependent Opening Directly Imply Timed Release Encryption. .
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .
Faster FHEW Bootstrapping with Adaptive Key Update. .
Cryptographic Protocols and Blockchain. .
Attribute
based Key Exchange with Optimal Efficiency. .
Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .
Decentralized Fair Exchange with Advertising. .
Revisiting Rational Broadcast Protocols. .
Vulnerability Detection. .
WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .
Attention
based Code Summarization for Multi
label Vulnerability Detection. .
Lanstree: Cross
Architecture Binary Code Similarity Detection with a Bidirec tional Tree
Structured Embedding Model. .
What Matters Most in Vulnerabilities? Key Term Extraction for CVE
to
CWE Mapping with LLMs. .
Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .
Attacks. .
Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .
Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .
Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .
Short Papers. .
Enhancing Cold Boot Attacks with Probabilistic
Guided SAT
Solvers. .
DiSK: A Deniable Split KEM from The MLWE Problem. .
A Key
Update Mechanism for the Space Data Link Security Protocol. .
Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .
Fully Verifiable Ciphertext
Policy Attribute
Based Encryption. .
Few
Shot Retrieval
Augmented LLMs for Anomaly Detection in Network Traffic. .
Impossible Differential Attack on SAND
128.