Information Security and Privacy

Information Security and Privacy

27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings

Nguyen, Khoa; Susilo, Willy; Guo, Fuchun; Yang, Guomin

Springer International Publishing AG

12/2022

530

Mole

Inglês

9783031223006

15 a 20 dias

Descrição não disponível.
Symmetric-Key Cryptography.- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256.- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES.- PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher.- Improved Differential Attack on Round-Reduced LEA.- Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints.- Improved Division Property for Ciphers with Complex Linear Layers.- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation.- Public-Key Cryptanalysis.- Handle the Traces: Revisiting the Attack on ECDSA with EHNP.- Hybrid Dual and Meet-LWE Attack.- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018.- Public-Key Cryptography.- Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption.- Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace.- TIDE: A novel approach to constructing timed-release encryption.- Multi-signatures for ECDSA and its Applications in Blockchain.- Post-Quantum Cryptography.- Fiat-Shamir Signatures based on Module-NTRU.- Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling.- An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security.- Cryptographic Protocols.- Verifiable Decryption in the Head.- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives.- On Security of Fuzzy Commitment Scheme for Biometric Authentication.- SoK: Decentralized Randomness Beacon Protocols.- Blockchain.- CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.- DeChain: A Blockchain Framework Enhancing Decentralization via Sharding.- Garrison: A Novel Watchtower Scheme for Bitcoin.- Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
authentication;block ciphers;blockchain;computer networks;computer security;computer systems;cryptanalysis;cryptography;data communication systems;data security;databases;distributed computer systems;distributed systems;encryption;engineering;mathematics;network protocols;network security;parallel processing systems;public key cryptography