Seo / Kim Information Security and Cryptology – ICISC 2023
Erscheinungsjahr 2024
ISBN: 978-981-97-1238-0
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023, Revised Selected Papers, Part II
E-Book, Englisch, 308 Seiten
Reihe: Springer Nature Proceedings Computer Science
ISBN: 978-981-97-1238-0
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
The 31 full papers included in this book were carefully reviewed and selected from 78 submissions. They were organized in topical sections as follows:
Part I: Cryptanalysis and Quantum Cryptanalysis; Side Channel Attack; Signature Schemes.Part II: Cyber Security; Applied Cryptography; and Korean Post Quantum Cryptography.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Cyber Security
.- A Comparative Analysis of Rust-Based SGX Frameworks: Implications
for building SGX applications.- BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols.- mdTLS: How to make middlebox-aware TLS more efficient?.- PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing.- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras.-
Applied Cryptography
.- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.- Leakage-Resilient Attribute-based Encryption with Attribute-hiding.- Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.- Single-Shuffle Card-Based Protocols with Six Cards per Gate.- Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.- Finsler Encryption.- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set.-
Korean Post Quantum Cryptography
.- Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation.- Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator.- On the security of REDOG.




