|
|
|||
|
||||
OverviewThis book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025. The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks. Full Product DetailsAuthor: Yongdae Kim , Atsuko Miyaji , Mehdi TibouchiPublisher: Springer Verlag, Singapore Imprint: Springer Verlag, Singapore ISBN: 9789819544332ISBN 10: 9819544335 Pages: 658 Publication Date: 19 December 2025 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Post-Quantum Cryptography. .- Compressed verification for post-quantum signatures with long-term public keys. .- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. .- Strong Designated Verifier Signatures from Isogeny Assumptions. .- To extend or not to extend: Agile Masking Instructions for PQC. .- Symmetric-Key Cryptography. .- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation. .- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. .- Computing the restricted algebraic immunity, and application to WPB functions. .- Multi-Party Computation. .- Efficient Fuzzy Labeled PSI from Vector Ring-OLE. .- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions. .- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle. .- webSPDZ: Versatile MPC on the Web. .- Advanced Encryption. .- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption. .- On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. .- Faster FHEW Bootstrapping with Adaptive Key Update. .- Cryptographic Protocols and Blockchain. .- Attribute-based Key Exchange with Optimal Efficiency. .- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. .- Decentralized Fair Exchange with Advertising. .- Revisiting Rational Broadcast Protocols. .- Vulnerability Detection. .- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. .- Attention-based Code Summarization for Multi-label Vulnerability Detection. .- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model. .- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs. .- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. .- Attacks. .- Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. .- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. .- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. .- Short Papers. .- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers. .- DiSK: A Deniable Split KEM from The MLWE Problem. .- A Key-Update Mechanism for the Space Data Link Security Protocol. .- Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. .- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption. .- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic. .- Impossible Differential Attack on SAND-128.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||