Vai al contenuto principale della pagina

Cryptography, codes and cyber security : First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, proceedings / / edited by Abderrahmane Nitaj, Karim Zkik



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Cryptography, codes and cyber security : First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, proceedings / / edited by Abderrahmane Nitaj, Karim Zkik Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (127 pages)
Disciplina: 929.605
Soggetto topico: Computer security
Persona (resp. second.): NitajAbderrahmane
ZkikKarim
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Invited Papers -- Cryptanalysis of a Code-Based IdentificationScheme Presented in CANS 2018 -- An Embedded AI-Based Smart IntrusionDetection System for Edge-to-Cloud Systems -- A New Addition Law in Twisted Edwards Curves on Non Local Ring -- Contributed Papers -- New Lattice-Based Signature Based on Fiat-Shamir Framework Without Aborts -- A Complementary Result on the Construction of Quadratic Cyclotomic Classes -- A Framework for the Design of Secure and Efficient Proofs of Retrievability -- Compression Point in Field of Characteristic 3 -- Contents -- Invited Papers -- Cryptanalysis of a Code-Based Identification Scheme Presented in CANS 2018 -- 1 Introduction -- 2 Notation and Definitions for Rank-Based Cryptography -- 2.1 Notation -- 2.2 Definitions -- 2.3 Rank-Based Cryptography -- 2.4 The Algorithm of Gaborit, Ruatta, and Schreck (GRS) -- 3 The Protocol Proposed by Bellini et al. -- 4 Cryptanalysis -- 4.1 Flaws in Rank-Based Véron protocol -- 4.2 Our Attack and Result -- 5 New Identification Scheme -- 5.1 Security and Parameters -- 6 Signature Scheme -- 6.1 Signing Procedure -- 6.2 Verification Procedure -- 6.3 Signature Comparison -- 7 Conclusion -- References -- An Embedded AI-Based Smart Intrusion Detection System for Edge-to-Cloud Systems -- 1 Introduction -- 2 General Background -- 2.1 Edge-to-Cloud -- 2.2 AI and Machine Learning for Anomaly and Intrusion Detection -- 2.3 Connectivity -- 2.4 Security Standards and Frameworks -- 3 Monitoring Cyber Use-Case -- 3.1 Typical Architecture -- 3.2 Security Threats and Attack Surface -- 3.3 On-Board Intrusion Detection -- 3.4 Device Fleet Monitoring with AI -- 3.5 Case-Studies: Automotive and Healthcare -- 4 Discussion: Other Security Services for Edge-to-Cloud -- 4.1 Assets Provisioning -- 4.2 Secure Firmware Update -- 4.3 Device Identity -- 5 Conclusion.
References -- A New Addition Law in Twisted Edwards Curves on Non Local Ring -- 1 Introduction -- 2 The Ring Fq[e],e2=e -- 3 Twisted Edwards Curves over the Ring R -- 4 Addition in Twisted Edwards Curve EE,a,d(R) -- References -- Contributed Papers -- New Lattice-Based Signature Based on Fiat-Shamir Framework Without Aborts -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Lattices and BKZ Algorithm -- 2.3 Ring-Based Learning with Errors -- 3 Distributions -- 4 NTRU Lattices and New Problems -- 5 New Lattice-Based Signature -- 6 Security Proof and Analysis of the Proposed Signature -- 6.1 Security Proof of the Proposed Signature -- 6.2 Analysis of Key Recovery Attacks -- 7 Suggested Parameters -- 7.1 Parameters of bv, bs,v, s -- 7.2 Security Parameters -- 8 Conclusion -- References -- A Complementary Result on the Construction of Quadratic Cyclotomic Classes -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Organization of the Paper -- 2 Preliminaries -- 3 A Complementary Result for Theorem 1 -- 4 Conclusion -- References -- A Framework for the Design of Secure and Efficient Proofs of Retrievability -- 1 Introduction -- 1.1 Context and State-of-the-Art -- 1.2 Contributions -- 2 Background -- 2.1 The Constructive Cryptography Model -- 2.2 Proofs of Retrievability -- 2.3 Locally Correctable Codes -- 3 Our Framework -- 4 Our Authentication Protocol -- 5 Instantiation with High Rate LCCs -- 5.1 Lifted Reed-Solomon Codes -- 5.2 The Lifted RS PoR Scheme -- 5.3 The Graph Code PoR Scheme -- 6 Parameters -- References -- Compression Point in Field of Characteristic 3 -- 1 Introduction -- 2 Mathematical Background -- 2.1 Arithmetic of Elliptic Curve with Affine Coordinate in a Field of Characteristic 3 -- 3 Compression Point -- 3.1 First Wew Compression Points -- 3.2 The Second New Compression Points to Reduce Memory.
3.3 Comparison -- 4 Conclusions -- References -- Author Index.
Titolo autorizzato: Cryptography, codes and cyber security  Visualizza cluster
ISBN: 3-031-23201-1
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996503562703316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilitĂ  qui
Serie: Communications in Computer and Information Science