Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security and Privacy -

Information Security and Privacy

30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part I

Willy Susilo, Josef Pieprzyk (Herausgeber)

Buch | Softcover
396 Seiten
2025
Springer Nature Switzerland AG (Verlag)
978-981-96-9094-7 (ISBN)
CHF 122,80 inkl. MwSt
  • Versand in 10-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.


The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and
selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.

.- Symmetric-Key Cryptography and Cryptanalysis.


.- Forgery Attacks on SipHash.


.- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities.


.- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.


.- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri.


.- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo.


.- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.


.- Public-Key Encryption.


.- Ideal Transformations for Public Key Encryption.


.- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection.


.- Digital Signatures and Zero Knowledge.


.- Compressed Sigma Protocols: New Model and Aggregation Techniques.


.- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.


.- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree.


.- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.


.- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.


.- Cryptographic Protocols and Blockchain.


.- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.


.- TEAKEX: TESLA-Authenticated Group Key Exchange.


.- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.


.- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.


.- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.


.- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo 44 Illustrations, color; 44 Illustrations, black and white
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • Al Security • authentication • Blockchain technology • Cloud Security • Cryptology • Cyber-physical Systems Security • Database Security • digital forensics • Key Management • Lightweight Security • loT security • Network Security • Privacy attacks and defenses • privacy enhancing technologies • Security implementation • security policy • security protocols • Software Security • System Security
ISBN-10 981-96-9094-3 / 9819690943
ISBN-13 978-981-96-9094-7 / 9789819690947
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95