Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were care...

Full description

Bibliographic Details
Other Authors: Ge, Chunpeng (Editor), Yung, Moti (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2024, 2024
Edition:1st ed. 2024
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04572nmm a2200457 u 4500
001 EB002198511
003 EBX01000000000000001335714
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240301 ||| eng
020 |a 9789819709458 
100 1 |a Ge, Chunpeng  |e [editor] 
245 0 0 |a Information Security and Cryptology  |h Elektronische Ressource  |b 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II  |c edited by Chunpeng Ge, Moti Yung 
250 |a 1st ed. 2024 
260 |a Singapore  |b Springer Nature Singapore  |c 2024, 2024 
300 |a XVII, 419 p. 114 illus., 90 illus. in color  |b online resource 
505 0 |a Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things -- TRGE: A Backdoor Detection after Quantizatio -- Improved Homomorphic Evaluation for Hash Function based on TFHE -- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM -- Partial Key Exposure Attack on Common Prime RSA -- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth 
505 0 |a Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound -- Full Round Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments --  
505 0 |a System Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models -- An Android Malware Detection Method Using Better API Contextual Information -- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method -- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation -- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing -- TIA: Token Importance Transferable Attack on Vision Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr -- Automatic Search of Linear Structure: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 --  
653 |a Computer Communication Networks 
653 |a Mobile and Network Security 
653 |a Computer networks / Security measures 
653 |a Image processing / Digital techniques 
653 |a Computer vision 
653 |a Cryptography 
653 |a Application software 
653 |a Computer networks  
653 |a Computer Imaging, Vision, Pattern Recognition and Graphics 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a Yung, Moti  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/978-981-97-0945-8 
856 4 0 |u https://doi.org/10.1007/978-981-97-0945-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters