Information Security and Cryptology - ICISC 2024
27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers
Herausgegeben:Kim, Jongsung; Park, Jungsoo; Lee, Wai-Kong
Information Security and Cryptology - ICISC 2024
27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers
Herausgegeben:Kim, Jongsung; Park, Jungsoo; Lee, Wai-Kong
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 27th International Conference on Information Security and Cryptology on Information Security and Cryptology ICISC 2024, held in Seoul, South Korea, during November 20 22, 2024.
The 23 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: cryptanalysis of block ciphers; signature schemes; applied cryptography; quantum cryptography and deep learning based analysis; side-channel and automotive attack; cyber security; and AI security.
Andere Kunden interessierten sich auch für
Tal Malkin (Volume ed.)Topics in Cryptology - CT-RSA 200838,99 €
Information Security and Cryptology - ICISC 201638,99 €
Information Security and Cryptology - ICISC 202357,99 €
Information Security and Cryptology - ICISC 202349,99 €
Advances in Cryptology - CRYPTO 202559,99 €
Advances in Cryptology - CRYPTO 202559,99 €
Advances in Cryptology - CRYPTO 202558,99 €-
-
-
This book constitutes the refereed proceedings of the 27th International Conference on Information Security and Cryptology on Information Security and Cryptology ICISC 2024, held in Seoul, South Korea, during November 20 22, 2024.
The 23 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: cryptanalysis of block ciphers; signature schemes; applied cryptography; quantum cryptography and deep learning based analysis; side-channel and automotive attack; cyber security; and AI security.
The 23 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: cryptanalysis of block ciphers; signature schemes; applied cryptography; quantum cryptography and deep learning based analysis; side-channel and automotive attack; cyber security; and AI security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 15596
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-5565-6
- Seitenzahl: 504
- Erscheinungstermin: 15. Juni 2025
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 756g
- ISBN-13: 9789819655656
- ISBN-10: 981965565X
- Artikelnr.: 73633784
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 15596
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-5565-6
- Seitenzahl: 504
- Erscheinungstermin: 15. Juni 2025
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 756g
- ISBN-13: 9789819655656
- ISBN-10: 981965565X
- Artikelnr.: 73633784
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.
.- Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.







