LEADER 04484nam 22007455 450 001 996668470003316 005 20250730020225.0 010 $a981-9690-98-6 024 7 $a10.1007/978-981-96-9098-5 035 $a(MiAaPQ)EBC32202186 035 $a(Au-PeEL)EBL32202186 035 $a(CKB)39620862400041 035 $a(DE-He213)978-981-96-9098-5 035 $a(EXLCZ)9939620862400041 100 $a20250709d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14?16, 2025, Proceedings, Part II /$fedited by Willy Susilo, Josef Pieprzyk 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (674 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15659 311 08$a981-9690-97-8 327 $a -- Post-Quantum Cryptography. -- Towards Quantum Security of Hirose Compression Function and Romulus-H. -- Efficient Multi-instance Vector Commitment and Application to Post quantum Signatures. -- Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium. -- Efficient Revocable Identity-Based Encryption from Middle-Product LWE. -- Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology. -- Partial Key Exposure Attacks on UOV and Its Variants. -- Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWEBased Optimization. -- Fiat-Shamir with Rejection and Rotation. -- Amoeba: More Flexible RLWE-based KEM. -- Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle. -- Homomorphic Encryption and Applications. -- Accountability for Server Misbehavior in Homomorphic Secret Sharing. -- High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping. -- Refined Error Management for Gate Bootstrapping. -- Cryptographic Foundations and Number Theory. -- Compact Lifting for NTT-unfriendly Modulus. -- Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. -- Solving Generalized Approximate Divisor Multiples Problems. 330 $aThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14?16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15659 606 $aData protection 606 $aComputer security 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aBlockchains (Databases) 606 $aData and Information Security 606 $aPrinciples and Models of Security 606 $aCryptology 606 $aPrivacy 606 $aMobile and Network Security 606 $aBlockchain 615 0$aData protection. 615 0$aComputer security. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aBlockchains (Databases) 615 14$aData and Information Security. 615 24$aPrinciples and Models of Security. 615 24$aCryptology. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aBlockchain. 676 $a005.8 700 $aSusilo$b Willy$01759814 701 $aPieprzyk$b Josef$0486892 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996668470003316 996 $aInformation Security and Privacy$94406540 997 $aUNISA