Information Security and Cryptology (Registro nro. 260715)

MARC details
000 -LIDER
fixed length control field 05211nam a22006975i 4500
001 - CONTROL NUMBER
control field 978-3-031-26553-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240207153506.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230218s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031265532
-- 978-3-031-26553-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Information Security and Cryptology
Medium [electronic resource] :
Remainder of title 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers /
Statement of responsibility, etc. edited by Yi Deng, Moti Yung.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent X, 496 p. 118 illus., 70 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13837
500 ## - GENERAL NOTE
General note Acceso multiusuario
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Block Ciphers -- Best Paper: How Fast Can SM4 Be in Software? -- LLLWBC: A New Low-Latency Light-Weight Block Cipher -- New Automatic Search Tool for Searching for Impossible Differentials Using Undisturbed Bits -- Public key Encryption & Signature -- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature -- SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications -- McEliece-type encryption based on Gabidulin codes with no hidden structure -- Quantum -- Optimizing the depth of quantum implementations of linear layers -- IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited -- MPC -- Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion -- Amortizing Division and Exponentiation -- Cryptanalysis -- Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT -- Cryptanalysis of Ciminion -- Clustering Effect of Iterative Differential and Linear Trails -- Differential Cryptanalysis of Round-reduced SPEEDY Family -- Mathematical aspects of Crypto -- A note on inverted twisted Edwards curve -- Efficiently Computable Complex Multiplication of Elliptic Curves -- Several classes of Niho type Boolean functions with few Walsh transform values -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns -- Efficient DNN Backdoor Detection Guided by Static Weight Analysis -- Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples using Mimetic Feature for 3D Humans -- Lattices -- Subfield Attacks on HSVP in Ideal Lattices -- On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices -- Inferring Sequences Produced by the Quadratic Generator.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Image processing
Subdivisión general Digital techniques.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer vision.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer networks
Subdivisión general Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer Imaging, Vision, Pattern Recognition and Graphics.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Cryptology.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Deng, Yi.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yung, Moti.
Relator term editor.
-- (orcid)0000-0003-0848-0873
-- https://orcid.org/0000-0003-0848-0873
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031265525
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031265549
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 13837
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-26553-2
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 07/02/2024   07/02/2024 1 Libro Electrónico

Con tecnología Koha