Choose an application
It is our great pleasure to welcome you to the 7th ACM Asia Public-Key Cryptography Workshop - APKC 2020, held on October 6, 2020, in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020). Public-key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public-key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretical aspects of public-key cryptography. The call for papers attracted 20 submissions from Asia, Europe, and USA. The program committee accepted 6 papers based on their overall quality and novelty (acceptance ratio: 30%). The program also includes one invited talk entitled "Insider Collusion Attack on Distributed Machine Learning System and its Solutions -- A Case of SVM" by Dr. Peter Shaojui Wang. We hope these proceedings will serve as a valuable reference for researchers and practitioners in the field of public-key cryptography and its applications.
Choose an application
Choose an application
Choose an application
Choose an application
Modern internet-enabled devices and fast communication technologies have ushered in a revolution in sharing of digital images and video. This may be for social reasons or for commercial and industrial applications. Attackers can steal this data or manipulate it for their own uses, causing financial and emotional damage to the owners. This drives the need for advanced security solutions and the need to continuously develop and maintain security measures in an ever-evolving battle against fraud and malicious intent. There are various techniques employed in protecting digital media and information, such as digital watermarking, cryptography, stenography, data encryption, and more. In addition, sharing platforms and connected nodes themselves may be open to vulnerabilities and can suffer from security breaches. This book reviews present state-of-the-art research related to the security of digital imagery and video, including developments in machine learning applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in the multimedia domain by reviewing present and evolving security solutions, their limitations, and future research directions.
Data encryption (Computer science) --- Digital media. --- Data encryption. --- Engineering.
Choose an application
Choose an application
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India. The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography.
Choose an application
Choose an application
Choose an application
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.