Information Security and Cryptology
Springer Nature Switzerland AG (Verlag)
978-981-96-4733-0 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
.- Public Key Cryptosystems.
.- Extended Policy-based Sanitizable Signatures.
.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations.
.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage.
.- Generalized Cryptanalysis of Cubic Pell RSA.
.- On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.
.- Hierarchical Functional Encryption for Quadratic Transformation.
.- Solving Modular Linear Equations via Automated Coppersmith and its Applications.
.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.
.- Security Protocols Analysis.
.- Permutation Argument via Bases Transformation.
.- Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage.
.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.
.- Symmetric Cryptanalysis.
.- Committing Security of AEAD Based on Stream Cipher.
.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method.
.- Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity..
.- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers.
.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
.- An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously.
.- Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.
.- Cryptanalysis of BAKSHEESH Block Cipher.
.- Quantum and Post Quantum Cryptography.
.- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack.
.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE.
.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON.
.- Quantum Public-Key Encryption of Quantum States, and More.
| Erscheinungsdatum | 28.05.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | 39 Illustrations, color; 42 Illustrations, black and white |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Grafik / Design ► Digitale Bildverarbeitung |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Schlagworte | AI and Security • big data and cloud security • Foundations of Cryptography • Implementation of cryptosystems • Key exchange • Privacy-Enhancing Technologies • Public Key Cryptosystems • Quantum and Post Quantum Cryptography • security analysis • Security Protocols Analysis • Symmetric Cryptanalysis • Watermarking |
| ISBN-10 | 981-96-4733-9 / 9819647339 |
| ISBN-13 | 978-981-96-4733-0 / 9789819647330 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich