|
|
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security. Full Product DetailsAuthor: Toru Nakanishi , Ryo NojimaPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2021 Volume: 12835 Weight: 0.415kg ISBN: 9783030859862ISBN 10: 303085986 Pages: 253 Publication Date: 27 August 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsLattice-Based Cryptography A trace map attack against special ring-LWE samples.- Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem.- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.- Evidence Collection and Preservation System with Virtual Machine Monitoring.- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices.- FFT Program Generation for Ring LWE-based Cryptography.- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure.- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures.- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.- Simple Matrix Signature Scheme.- Game Theory and Security Moving Target Defense for the CloudControl Game.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |