Cryptology and Network Security
Springer Verlag, Singapore
978-981-95-4433-2 (ISBN)
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
.- Post-Quantum Cryptography.
.- Compressed verification for post-quantum signatures with long-term public keys.
.- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its
Application in NTRUReEncrypt.
.- Strong Designated Verifier Signatures from Isogeny Assumptions.
.- To extend or not to extend: Agile Masking Instructions for PQC.
.- Symmetric-Key Cryptography.
.- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation.
.- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs.
.- Computing the restricted algebraic immunity, and application to WPB functions.
.- Multi-Party Computation.
.- Efficient Fuzzy Labeled PSI from Vector Ring-OLE.
.- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with
Partial-Open Actions.
.- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle.
.- webSPDZ: Versatile MPC on the Web.
.- Advanced Encryption.
.- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption.
.- On the Relations between Matchmaking Public Key Encryption and Public Key
Authenticated Encryption with Keyword Search.
.- Faster FHEW Bootstrapping with Adaptive Key Update.
.- Cryptographic Protocols and Blockchain.
.- Attribute-based Key Exchange with Optimal Efficiency.
.- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity.
.- Decentralized Fair Exchange with Advertising.
.- Revisiting Rational Broadcast Protocols.
.- Vulnerability Detection.
.- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder.
.- Attention-based Code Summarization for Multi-label Vulnerability Detection.
.- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model.
.- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE
Mapping with LLMs.
.- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text.
.- Attacks.
.- Unveiling the critical attack path for implanting backdoors in supply chains:
Practical experience from XZ.
.- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach.
.- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns.
.- Short Papers.
.- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers.
.- DiSK: A Deniable Split KEM from The MLWE Problem.
.- A Key-Update Mechanism for the Space Data Link Security Protocol.
.- Automated Verification of Proofs in the Universal Composability Framework
with Markov Decision Processes.
.- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption.
.- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic.
.- Impossible Differential Attack on SAND-128.
| Erscheinungsdatum | 22.11.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | 84 Illustrations, color; 52 Illustrations, black and white |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Advanced Encryption • Attacks • Cryptographic Protocols and Blockchain • Multi-Party Computation • post-quantum cryptography • Symmetric-Key Cryptography • vulnerability detection |
| ISBN-10 | 981-95-4433-5 / 9819544335 |
| ISBN-13 | 978-981-95-4433-2 / 9789819544332 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich