Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic prools and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
1147482390
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic prools and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
89.99 Pre Order
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II

Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II

Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II

Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II

Paperback

$89.99 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on August 15, 2025

Related collections and offers


Overview

This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic prools and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.

Product Details

ISBN-13: 9789819690978
Publisher: Springer Nature Singapore
Publication date: 08/15/2025
Series: Lecture Notes in Computer Science , #15659
Pages: 344
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

.- Post-Quantum Cryptography.

.- Towards Quantum Security of Hirose Compression Function and Romulus-H.

.- Efficient Multi-instance Vector Commitment and Application to Post quantum Signatures.

.- Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium.

.- Efficient Revocable Identity-Based Encryption from Middle-Product LWE.

.- Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology.

.- Partial Key Exposure Attacks on UOV and Its Variants.

.- Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWEBased Optimization.

.- Fiat-Shamir with Rejection and Rotation.

.- Amoeba: More Flexible RLWE-based KEM.

.- Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle.

.- Homomorphic Encryption and Applications.

.- Accountability for Server Misbehavior in Homomorphic Secret Sharing.

.- High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping.

.- Refined Error Management for Gate Bootstrapping.

.- Cryptographic Foundations and Number Theory.

.- Compact Lifting for NTT-unfriendly Modulus.

.- Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience.

.- Solving Generalized Approximate Divisor Multiples Problems.

From the B&N Reads Blog

Customer Reviews