Buch, Englisch, 558 Seiten, Format (B × H): 155 mm x 235 mm
28th International Conference, Seoul, South Korea, November 19-21, 2025, Revised Selected Papers
Buch, Englisch, 558 Seiten, Format (B × H): 155 mm x 235 mm
Reihe: Lecture Notes in Computer Science
ISBN: 978-981-958033-0
Verlag: Springer Verlag, Singapore
This book constitutes the refereed proceedings of the 28th International Conference on Information Security and Cryptology on Information Security and Cryptology – ICISC 2025, held in Seoul, South Korea, during November 19–21, 2025.
The 28 full papers included in this book were carefully reviewed and selected from 74 submissions.They were organized in topical sections as follows:AI-Driven Threat Detection & Federated Learning; Generative & Steganographic Security Applications; Post-Quantum Cryptography & Migration; Side-Channel & Fault Analysis in PQC; Network & Application Security; Quantum Cryptanalysis & Theoretical Limits; Implementation & Hardware Acceleration; Symmetric Cryptanalysis & New Constructions; Advanced Cryptographic Protocols & Signatures.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
.- AI-Driven Threat Detection & Federated Learning.
.- Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages.
.- Tabular or Image Input? Transformers for NIDS: A Comparative Study.
.- AdvCodeGen: Adversarial Code Generation via Large Language Models.
.- Generative & Steganographic Security Applications.
.- Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification.
.- Improving Scalable Clustering for IoT Malware via Code Region Extraction.
.- PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies.
.- Post-Quantum Cryptography & Migration.
.- Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach.
.- On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment.
.- Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption.
.- Side-Channel & Fault Analysis in PQC.
.- Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method.
.- Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion.
.- Quantum Circuit Implementation and Resource Analysis of AIM2.
.- Network & Application Security.
.- Comprehensive Security Analysis of End-to-End Encryption in LINE.
.- Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection.
.- Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function.
.- Quantum Cryptanalysis & Theoretical Limits.
.- Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare.
.- Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256.
.- Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function.
.- Impossibility Results of Card-Based Protocols via Mathematical Optimization.
.- Implementation & Hardware Acceleration.
.- High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers.
.- Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU.
.- Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation.
.- Symmetric Cryptanalysis & New Constructions.
.- On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks.
.- On the Weak Differential Resistance of MGFN and the Exploration of Variants.
.- New Derivation Rule for Linear Approximations and Its Application to ChaCha.
.- Advanced Cryptographic Protocols & Signatures.
.- Strong Designated Verifier Signatures with Non-delegatability from CSIDH.
.- An Undeniable Signature Scheme Utilizing Module Lattices.
.- A Witness Encryption for Quadratic Arithmetic Programs.




