MARC details
| 000 -LEADER |
| fixed length control field |
03846nam a22002535i 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
230614s2023 sz | s |||| 0|eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783031354861 |
| -- |
978-3-031-35486-1 |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| 245 10 - TITLE STATEMENT |
| Title |
Information Security and Privacy |
| Medium |
[electronic resource] : |
| Remainder of title |
28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings / |
| Statement of responsibility, etc. |
edited by Leonie Simpson, Mir Ali Rezazadeh Baee. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
1st ed. 2023. |
| 260 #1 - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Cham : |
| Name of publisher, distributor, etc. |
Springer Nature Switzerland : |
| -- |
Imprint: Springer, |
| Date of publication, distribution, etc. |
2023. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
XIII, 652 p. 131 illus., 39 illus. in color. |
| Other physical details |
online resource. |
| 490 1# - SERIES STATEMENT |
| Series statement |
Lecture Notes in Computer Science, |
| International Standard Serial Number |
1611-3349 ; |
| Volume/sequential designation |
13915 |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Symmetric-Key Cryptography -- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures -- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers -- A New Correlation Cube Attack Based on Division Property -- The Triangle Differential Cryptanalysis -- Key Recovery Attacks on Grain-like Keystream Generators with Key Injection -- Related-Cipher Attacks: Applications to Ballet and ANT -- Cryptanalysis of SPEEDY -- Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure -- Exploring Formal Methods for Cryptographic Hash FunctionImplementations -- Public-Key Cryptography -- A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM -- Compact Password Authenticated Key Exchange from Group Actions -- Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE -- Identity-Based Encryption from Lattices Using Approximate Trapdoors -- Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications -- Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors -- Post-Quantum Cryptography -- Quantum-access Security of Hash-based Signature Schemes -- Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model -- Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security -- Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers -- Memory-Efficient Quantum Information Set Decoding Algorithm -- Cryptographic Protocols -- CSI-SharK: CSI-FiSh with Sharing-friendly Keys -- Practical Verifiable Random Function with RKA Security -- Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions -- Modular Design of KEM-Based Authenticated Key Exchange -- Reusable, Instant and Private Payment Guarantees for Cryptocurrencies -- System Security -- BinAlign: Alignment Padding based Compiler Provenance Recovery -- Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data and Information Security. |
| 9 (RLIN) |
1464643 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Simpson, Leonie. |
| Relator term |
editor. |
| Authority record control number or standard number |
(orcid)0000-0001-8434-9741 |
| Real World Object URI |
https://orcid.org/0000-0001-8434-9741 |
| Relationship |
edt |
| -- |
http://id.loc.gov/vocabulary/relators/edt |
| 9 (RLIN) |
1306254 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Rezazadeh Baee, Mir Ali. |
| Relator term |
editor. |
| Authority record control number or standard number |
(orcid)0000-0003-1575-7287 |
| Real World Object URI |
https://orcid.org/0000-0003-1575-7287 |
| Relationship |
edt |
| -- |
http://id.loc.gov/vocabulary/relators/edt |
| 9 (RLIN) |
1519577 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-031-35486-1">https://doi.org/10.1007/978-3-031-35486-1</a> |
| Materials specified |
Click Here |
| 887 ## - NON-MARC INFORMATION FIELD |
| Content of non-MARC field |
Akhil Chandra Saren |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
E-Books |