Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "security"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/138865072X |
| Titel | Cryptology and Network Security : 24th International Conference, CANS 2025, Osaka, Japan, November 17–20, 2025, Proceedings / edited by Yongdae Kim, Atsuko Miyaji, Mehdi Tibouchi |
| Person(en) |
Kim, Yongdae (Herausgeber) Miyaji, Atsuko (Herausgeber) Tibouchi, Mehdi (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Singapore : Springer Nature Singapore, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XVI, 658 p. 136 illus., 84 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-981-95-4433-2 Printed edition:: ISBN: 978-981-95-4435-6 |
| Inhalt | -- Post-Quantum Cryptography. -- Compressed verification for post-quantum signatures with long-term public keys. -- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. -- Strong Designated Verifier Signatures from Isogeny Assumptions. -- To extend or not to extend: Agile Masking Instructions for PQC. -- Symmetric-Key Cryptography. -- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation. -- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. -- Computing the restricted algebraic immunity, and application to WPB functions. -- Multi-Party Computation. -- Efficient Fuzzy Labeled PSI from Vector Ring-OLE. -- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions. -- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle. -- webSPDZ: Versatile MPC on the Web. -- Advanced Encryption. -- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption. -- On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. -- Faster FHEW Bootstrapping with Adaptive Key Update. -- Cryptographic Protocols and Blockchain. -- Attribute-based Key Exchange with Optimal Efficiency. -- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. -- Decentralized Fair Exchange with Advertising. -- Revisiting Rational Broadcast Protocols. -- Vulnerability Detection. -- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. -- Attention-based Code Summarization for Multi-label Vulnerability Detection. -- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model. -- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs. -- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. -- Attacks. -- Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. -- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. -- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. -- Short Papers. -- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers. -- DiSK: A Deniable Split KEM from The MLWE Problem. -- A Key-Update Mechanism for the Space Data Link Security Protocol. -- Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. -- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption. -- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic. -- Impossible Differential Attack on SAND-128. |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2602010311529.855334615479 DOI: 10.1007/978-981-95-4434-9 |
| URL | https://doi.org/10.1007/978-981-95-4434-9 |
| ISBN/Einband/Preis | 978-981-95-4434-9 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 16351 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

