LEADER 04389nam 22005295 450 001 9910731463703321 005 20230614140740.0 010 $a3-031-35486-9 024 7 $a10.1007/978-3-031-35486-1 035 $a(MiAaPQ)EBC30594702 035 $a(Au-PeEL)EBL30594702 035 $a(OCoLC)1382695226 035 $a(DE-He213)978-3-031-35486-1 035 $a(PPN)272259624 035 $a(CKB)27023211700041 035 $a(EXLCZ)9927023211700041 100 $a20230614d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5?7, 2023, Proceedings /$fedited by Leonie Simpson, Mir Ali Rezazadeh Baee 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (658 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13915 311 08$aPrint version: Simpson, Leonie Information Security and Privacy Cham : Springer International Publishing AG,c2023 9783031354854 320 $aIncludes bibliographical references and index. 327 $aSymmetric-Key Cryptography -- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures -- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers -- A New Correlation Cube Attack Based on Division Property -- The Triangle Differential Cryptanalysis -- Key Recovery Attacks on Grain-like Keystream Generators with Key Injection -- Related-Cipher Attacks: Applications to Ballet and ANT -- Cryptanalysis of SPEEDY -- Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure -- Exploring Formal Methods for Cryptographic Hash FunctionImplementations -- Public-Key Cryptography -- A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM -- Compact Password Authenticated Key Exchange from Group Actions -- Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE -- Identity-Based Encryption from Lattices Using Approximate Trapdoors -- Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications -- Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors -- Post-Quantum Cryptography -- Quantum-access Security of Hash-based Signature Schemes -- Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model -- Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security -- Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers -- Memory-Efficient Quantum Information Set Decoding Algorithm -- Cryptographic Protocols -- CSI-SharK: CSI-FiSh with Sharing-friendly Keys -- Practical Verifiable Random Function with RKA Security -- Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions -- Modular Design of KEM-Based Authenticated Key Exchange -- Reusable, Instant and Private Payment Guarantees for Cryptocurrencies -- System Security -- BinAlign: Alignment Padding based Compiler Provenance Recovery -- Encrypted Network Traffic Classiffication with Higher Order Graph Neural Network. 330 $aThis book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13915 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 676 $a005.8 702 $aSimpson$b Leonie 702 $aRezazadeh Baee$b Mir Ali 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910731463703321 996 $aInformation Security and Privacy$93395200 997 $aUNINA