Information Security and Privacy (Record no. 1609511)

MARC details
000 -LEADER
fixed length control field 03846nam a22002535i 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230614s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031354861
-- 978-3-031-35486-1
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Information Security and Privacy
Medium [electronic resource] :
Remainder of title 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings /
Statement of responsibility, etc. edited by Leonie Simpson, Mir Ali Rezazadeh Baee.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
260 #1 - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham :
Name of publisher, distributor, etc. Springer Nature Switzerland :
-- Imprint: Springer,
Date of publication, distribution, etc. 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 652 p. 131 illus., 39 illus. in color.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13915
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Symmetric-Key Cryptography -- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures -- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers -- A New Correlation Cube Attack Based on Division Property -- The Triangle Differential Cryptanalysis -- Key Recovery Attacks on Grain-like Keystream Generators with Key Injection -- Related-Cipher Attacks: Applications to Ballet and ANT -- Cryptanalysis of SPEEDY -- Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure -- Exploring Formal Methods for Cryptographic Hash FunctionImplementations -- Public-Key Cryptography -- A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM -- Compact Password Authenticated Key Exchange from Group Actions -- Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE -- Identity-Based Encryption from Lattices Using Approximate Trapdoors -- Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications -- Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors -- Post-Quantum Cryptography -- Quantum-access Security of Hash-based Signature Schemes -- Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model -- Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security -- Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers -- Memory-Efficient Quantum Information Set Decoding Algorithm -- Cryptographic Protocols -- CSI-SharK: CSI-FiSh with Sharing-friendly Keys -- Practical Verifiable Random Function with RKA Security -- Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions -- Modular Design of KEM-Based Authenticated Key Exchange -- Reusable, Instant and Private Payment Guarantees for Cryptocurrencies -- System Security -- BinAlign: Alignment Padding based Compiler Provenance Recovery -- Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 1464643
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Simpson, Leonie.
Relator term editor.
Authority record control number or standard number (orcid)0000-0001-8434-9741
Real World Object URI https://orcid.org/0000-0001-8434-9741
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 1306254
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rezazadeh Baee, Mir Ali.
Relator term editor.
Authority record control number or standard number (orcid)0000-0003-1575-7287
Real World Object URI https://orcid.org/0000-0003-1575-7287
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 1519577
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a>
Materials specified Click Here
887 ## - NON-MARC INFORMATION FIELD
Content of non-MARC field Akhil Chandra Saren
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        National Library of India National Library of India Online Resource 17/04/2024   005.8 EBK000044618ENG 17/04/2024 17/04/2024 E-Books
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India