回首頁 到查詢結果 [ subject:"Internet- Security measures" ]

Codes, cryptology and information se...
C2SI (Conference) (2023 :)

FindBook      Google Book      Amazon      博客來     
  • Codes, cryptology and information security = 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Codes, cryptology and information security/ edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi.
    其他題名: 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023 : proceedings /
    其他題名: C2SI 2023
    其他作者: El Hajji, Said.
    團體作者: C2SI (Conference)
    出版者: Cham :Springer Nature Switzerland : : 2023.,
    面頁冊數: 1 online resource (xv, 408 p.) :ill. (chiefly col.), digital ;24 cm.
    內容註: Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-33017-9
    ISBN: 9783031330179
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入