Information Security and Cryptology - ICISC 2025

Information Security and Cryptology - ICISC 2025 portes grátis

Information Security and Cryptology - ICISC 2025

28th International Conference, Seoul, South Korea, November 19-21, 2025, Revised Selected Papers

Seo, Hwajeong

Springer Verlag, Singapore

04/2026

530

Mole

Inglês

9789819580330

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- AI-Driven Threat Detection & Federated Learning.
.- Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages.
.- Tabular or Image Input? Transformers for NIDS: A Comparative Study.
.- AdvCodeGen: Adversarial Code Generation via Large Language Models.
.- Generative & Steganographic Security Applications.
.- Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification.
.- Improving Scalable Clustering for IoT Malware via Code Region Extraction.
.- PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies.
.- Post-Quantum Cryptography & Migration.
.- Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach.
.- On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment.
.- Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption.
.- Side-Channel & Fault Analysis in PQC.
.- Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method.
.- Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion.
.- Quantum Circuit Implementation and Resource Analysis of AIM2.
.- Network & Application Security.
.- Comprehensive Security Analysis of End-to-End Encryption in LINE.
.- Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection.
.- Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function.
.- Quantum Cryptanalysis & Theoretical Limits.
.- Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare.
.- Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256.
.- Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function.
.- Impossibility Results of Card-Based Protocols via Mathematical Optimization.
.- Implementation & Hardware Acceleration.
.- High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers.
.- Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU.
.- Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation.
.- Symmetric Cryptanalysis & New Constructions.
.- On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks.
.- On the Weak Differential Resistance of MGFN and the Exploration of Variants.
.- New Derivation Rule for Linear Approximations and Its Application to ChaCha.
.- Advanced Cryptographic Protocols & Signatures.
.- Strong Designated Verifier Signatures with Non-delegatability from CSIDH.
.- An Undeniable Signature Scheme Utilizing Module Lattices.
.- A Witness Encryption for Quadratic Arithmetic Programs.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Security and Privacy;Cryptography;Network Security;Security Services;Information Systems;Applied Cryptography;Cryptographic Protocols; Authentication;Secure Communication;Privacy Protection