Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I

Author:   Rongmao Chen ,  Robert H. Deng ,  Moti Yung
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819562053


Pages:   604
Publication Date:   04 February 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $237.57 Quantity:  
Pre-Order

Share |

Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I


Overview

Full Product Details

Author:   Rongmao Chen ,  Robert H. Deng ,  Moti Yung
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819562053


ISBN 10:   9819562058
Pages:   604
Publication Date:   04 February 2026
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Post-Quantum Cryptography. .-  Further Research on Meet-LWE and Its Application to Weakened Kyber. .-  Efficient Implementation of Post-Quantum Signature Algorithms for Next Generation of Blockchains. .-  Accelerating NTRU-based Bootstrapping with Block Key Distributions. .-  Lattice IBE from Non-spherical Gaussian Sampling with Tight Security. .-  Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE. .- An Area-Performance Balanced Hardware Accelerator of NTT for Kyber. .-  A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation. .- Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model. .- Speedy Error Reconciliation. .-  Functional Encryption. .-  A Note on the Simpler Construction to Achieve Dynamic FE via IBE. .-  Onion Encryption Revisited: Relations Among Security Notions. .-  New Key Combiner Schemes for Multiple Keys. .-   Wildcarded Identity-Based Inner Product Encryption Based on SM9. .- Dual-Threshold Verifiable Witness Encryption for Signatures and its Applications. .- Cryptanalysis and Implementations I. .- Improved Quantum Cryptanalysis on Generalized Feistel Structure. .-  Algebraic Cryptanalysis on Reduced-round Trivium-LE. .-  Automated Periodic Distinguisher Search for AND-RX Ciphers. .-  Efficient Reconstruction of S-boxes from Partial Cryptographic Tables via MILP Modeling. .- Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification. .- Arithmetic Autocorrelation of Certain Binary Half-ℓ-sequences. .-  Related-Key Rectangle Attacks on Round-Reduced TWINE. .-  TwoLayerF: A Two-Layer Framework of PNB-based Key Recovery Attacks on ChaCha. .-  Exploring AI-Assisted Cryptanalytic Attacks on Multisets. .-  Distributed Quantum Key Recovery Attack on Pseudorandom Functions. .- Cryptanalysis and Implementations II. .-  An Area-Efficient Design of ZUC-256 Through Hardware Optimization. .- Revisit Bitslice Implementation of Dummy Shuffling. .- TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation. .- Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset. .-  Bit-by-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation. .-  Multi-feature Fusion Leakage Abuse Attacks against Dynamic Searchable Symmetric Encryption. .- A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack against Kyber.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List