Information Security and Privacy
Springer Nature Switzerland AG (Verlag)
978-981-96-9094-7 (ISBN)
The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and
selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
.- Symmetric-Key Cryptography and Cryptanalysis.
.- Forgery Attacks on SipHash.
.- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities.
.- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.
.- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri.
.- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo.
.- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.
.- Public-Key Encryption.
.- Ideal Transformations for Public Key Encryption.
.- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection.
.- Digital Signatures and Zero Knowledge.
.- Compressed Sigma Protocols: New Model and Aggregation Techniques.
.- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.
.- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree.
.- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.
.- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.
.- Cryptographic Protocols and Blockchain.
.- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.
.- TEAKEX: TESLA-Authenticated Group Key Exchange.
.- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.
.- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.
.- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.
.- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.
| Erscheinungsdatum | 13.06.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | 44 Illustrations, color; 44 Illustrations, black and white |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Access Control • Al Security • authentication • Blockchain technology • Cloud Security • Cryptology • Cyber-physical Systems Security • Database Security • digital forensics • Key Management • Lightweight Security • loT security • Network Security • Privacy attacks and defenses • privacy enhancing technologies • Security implementation • security policy • security protocols • Software Security • System Security |
| ISBN-10 | 981-96-9094-3 / 9819690943 |
| ISBN-13 | 978-981-96-9094-7 / 9789819690947 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich