LEADER 05861nam 22007815 450 001 996696880903316 005 20260102122906.0 010 $a981-9562-06-6 024 7 $a10.1007/978-981-95-6206-0 035 $a(CKB)44769990400041 035 $a(MiAaPQ)EBC32470708 035 $a(Au-PeEL)EBL32470708 035 $a(DE-He213)978-981-95-6206-0 035 $a(EXLCZ)9944769990400041 100 $a20260102d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Cryptology $e21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I /$fedited by Rongmao Chen, Robert H. Deng, Moti Yung 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (1132 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16408 311 08$a981-9562-05-8 327 $a -- Post-Quantum Cryptography. -- Further Research on Meet-LWE and Its Application to Weakened Kyber. -- Efficient Implementation of Post-Quantum Signature Algorithms for Next Generation of Blockchains. -- Accelerating NTRU-based Bootstrapping with Block Key Distributions. -- Lattice IBE from Non-spherical Gaussian Sampling with Tight Security. -- Fast Multi-key Bootstrapping Instantiated with NTRU and (R)LWE. -- An Area-Performance Balanced Hardware Accelerator of NTT for Kyber. -- A Framework for Fully Compact Transparent Ring Signature on Lattice and Its Instantiation. -- Tighter Security Proof of Falcon+ in the Quantum Random Oracle Model. -- Speedy Error Reconciliation. -- Functional Encryption. -- A Note on the Simpler Construction to Achieve Dynamic FE via IBE. -- Onion Encryption Revisited: Relations Among Security Notions. -- New Key Combiner Schemes for Multiple Keys. -- Wildcarded Identity-Based Inner Product Encryption Based on SM9. -- Dual-Threshold Verifiable Witness Encryption for Signatures and its Applications. -- Cryptanalysis and Implementations I. -- Improved Quantum Cryptanalysis on Generalized Feistel Structure. -- Algebraic Cryptanalysis on Reduced-round Trivium-LE. -- Automated Periodic Distinguisher Search for AND-RX Ciphers. -- Efficient Reconstruction of S-boxes from Partial Cryptographic Tables via MILP Modeling. -- Quantum Bisimulation-Based Acceleration Method for Quantum Cryptographic Protocol Verification. -- Arithmetic Autocorrelation of Certain Binary Half-?-sequences. -- Related-Key Rectangle Attacks on Round-Reduced TWINE. -- TwoLayerF: A Two-Layer Framework of PNB-based Key Recovery Attacks on ChaCha. -- Exploring AI-Assisted Cryptanalytic Attacks on Multisets. -- Distributed Quantum Key Recovery Attack on Pseudorandom Functions. -- Cryptanalysis and Implementations II. -- An Area-Efficient Design of ZUC-256 Through Hardware Optimization. -- Revisit Bitslice Implementation of Dummy Shuffling. -- TS-Seg: Temporal-Spatial Feature Fusion Based Side-Channel Trace Segmentation. -- Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset. -- Bit-by-Bit Total Collapse: A Novel Side-Channel Attack on HQC-128 Decapsulation. -- Multi-feature Fusion Leakage Abuse Attacks against Dynamic Searchable Symmetric Encryption. -- A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack against Kyber. 330 $aThe three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025. The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections: Part I : Post-Quantum Cryptography; Functional Encryption; Cryptanalysis and Implementations I; Cryptanalysis and Implementations II. Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models; Network Security & Traffic Analysis. Part III : Privacy Preserving/Enhancing Technologies; AI and Security I; AI and Security II. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16408 606 $aData protection 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aComputer networks 606 $aApplication software 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aMobile and Network Security 606 $aCryptology 615 0$aData protection. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aMobile and Network Security. 615 24$aCryptology. 676 $a005.8 700 $aChen$b Rongmao$01885031 701 $aDeng$b Robert H$01414400 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996696880903316 996 $aInformation Security and Cryptology$94519861 997 $aUNISA