Atnaujinkite slapukų nuostatas

El. knyga: Advances in Information and Computer Security: 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings

Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 14128
  • Išleidimo metai: 23-Aug-2023
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031413261
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 14128
  • Išleidimo metai: 23-Aug-2023
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031413261

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 2931, 2023. This event was held in hybrid mode.





The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
System and Hardware Security/.- Power analysis pushed too far: breaking
Android-based isolation with fuel gauges.- The Good, the Bad, and the Binary:
An LSTM-Based Method for Section Boundary Detection in Firmware
Analysis.- Reliability of Ring Oscillator PUFs with Reduced Helper
Data.- Symmetric Key Cryptography.- Improved Boomerang Attacks on
Deoxys-BC.- PMACrx: a vector-input MAC for high-dimensional vectors with BBB
security.- Public Key Cryptography 1.- A New Security Analysis Against MAYO
and QR-UOV Using Rectangular MinRank Attack.- Improved Hybrid Attack via
Error-Splitting Method for Finding Quinary Short Lattice Vectors.- Total
Break of a Public Key Cryptosystem Based on a Group of Permutation
Polynomials.- Public Key Cryptography 2.- Extractable Witness Encryption for
the Homogeneous Linear Equation problem.- Making Classical (Threshold)
Signatures Post-Quantum for Single Use on a Public Ledger.- Zero Knowledge
Proofs.- aPlonK: Aggregated PlonK from Multi-Polynomial Commitment
Schemes.- TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product
Argument without a Trusted Setup.- Card Based Cryptography.- Efficient
Card-Based Millionaires Protocols via Non-Binary Input Encoding.- Check
Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.