Description

Book Synopsis
?Cryptanalysis & Quantum Cryptanalysis.- Enhancing the Related-Key Security of PIPO through New Key Schedules.- Distinguisher and Related-Key Attack on HALFLOOP 96.- Revisiting Key Switching Techniques with Applications to Light-Key FHE.- Optimized Quantum Implementation of SEED.- Depth-Optimized Quantum Implementation of ARIA.- Finding Shortest Vector using Quantum NV Sieve on Grover.- Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator.- Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis.- Side Channel Attack.- Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages.- Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure.- A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis.- Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Ca

Information Security and Cryptology ICISC 2023

Product form

£56.99

Includes FREE delivery

RRP £59.99 – you save £3.00 (5%)

Order before 4pm today for delivery by Tue 23 Dec 2025.

A Paperback by Hwajeong Seo

3 in stock


    View other formats and editions of Information Security and Cryptology ICISC 2023 by Hwajeong Seo

    Publisher: Springer
    Publication Date: 3/8/2024
    ISBN13: 9789819712342, 978-9819712342
    ISBN10: 9819712343

    Description

    Book Synopsis
    ?Cryptanalysis & Quantum Cryptanalysis.- Enhancing the Related-Key Security of PIPO through New Key Schedules.- Distinguisher and Related-Key Attack on HALFLOOP 96.- Revisiting Key Switching Techniques with Applications to Light-Key FHE.- Optimized Quantum Implementation of SEED.- Depth-Optimized Quantum Implementation of ARIA.- Finding Shortest Vector using Quantum NV Sieve on Grover.- Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator.- Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis.- Side Channel Attack.- Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages.- Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure.- A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis.- Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Ca

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account