Cryptology and Network Security: 24th International Conference, CANS 2025, Osaka, Japan, November 17–20, 2025, Proceedings

Author:   Yongdae Kim ,  Atsuko Miyaji ,  Mehdi Tibouchi
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819544332


Pages:   658
Publication Date:   19 December 2025
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $237.57 Quantity:  
Pre-Order

Share |

Cryptology and Network Security: 24th International Conference, CANS 2025, Osaka, Japan, November 17–20, 2025, Proceedings


Overview

This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025. The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.

Full Product Details

Author:   Yongdae Kim ,  Atsuko Miyaji ,  Mehdi Tibouchi
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819544332


ISBN 10:   9819544335
Pages:   658
Publication Date:   19 December 2025
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Post-Quantum Cryptography. .- Compressed verification for post-quantum signatures with long-term public keys. .- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .- Strong Designated Verifier Signatures from Isogeny Assumptions. .- To extend or not to extend: Agile Masking Instructions for PQC. .- Symmetric-Key Cryptography. .- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation. .- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .- Computing the restricted algebraic immunity, and application to WPB functions. .- Multi-Party Computation. .- Efficient Fuzzy Labeled PSI from Vector Ring-OLE. .- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions. .- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle. .- webSPDZ: Versatile MPC on the Web. .- Advanced Encryption. .- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption. .- On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .- Faster FHEW Bootstrapping with Adaptive Key Update. .- Cryptographic Protocols and Blockchain. .- Attribute-based Key Exchange with Optimal Efficiency. .- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .- Decentralized Fair Exchange with Advertising. .- Revisiting Rational Broadcast Protocols. .- Vulnerability Detection. .- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .- Attention-based Code Summarization for Multi-label Vulnerability Detection. .- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model. .- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs. .- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .- Attacks. .- Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .- Short Papers. .- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers. .- DiSK: A Deniable Split KEM from The MLWE Problem. .- A Key-Update Mechanism for the Space Data Link Security Protocol. .- Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption. .- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic. .- Impossible Differential Attack on SAND-128.    

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List