001472269 000__ 05662cam\\22006977a\4500 001472269 001__ 1472269 001472269 003__ OCoLC 001472269 005__ 20230908003404.0 001472269 006__ m\\\\\o\\d\\\\\\\\ 001472269 007__ cr\un\nnnunnun 001472269 008__ 230812s2023\\\\si\\\\\\o\\\\\101\0\eng\d 001472269 019__ $$a1392164707 001472269 020__ $$a9789819930807$$q(electronic bk.) 001472269 020__ $$a9819930804$$q(electronic bk.) 001472269 020__ $$z9819930790 001472269 020__ $$z9789819930791 001472269 0247_ $$a10.1007/978-981-99-3080-7$$2doi 001472269 035__ $$aSP(OCoLC)1392342563 001472269 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dYDX 001472269 049__ $$aISEA 001472269 050_4 $$aQA76.9.M35$$bI58 2023eb 001472269 08204 $$a004.0151$$223/eng/20230814 001472269 1112_ $$aInternational Conference on Mathematics and Computing$$n(9th :$$d2023 :$$cVelha Goa, India) 001472269 24510 $$aProceedings of the ninth International Conference on Mathematics and Computing :$$bICMC 2023 /$$cDebasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J.K. Sahoo, editors. 001472269 2463_ $$aICMC 2023 001472269 260__ $$aSingapore :$$bSpringer,$$c2023. 001472269 300__ $$a1 online resource (433 p.). 001472269 4901_ $$aLecture Notes in Networks and Systems ;$$vv. 697 001472269 500__ $$aIncludes author index. 001472269 504__ $$aIncludes bibliographical references. 001472269 5050_ $$aIntro -- Committee -- Message from General Chairs -- Message from Program Chairs -- Preface -- Contents -- About the Editors -- Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Organization of the Paper -- 2 Related Work -- 2.1 Review of Verifiable Delay Functions -- 2.2 Cryptography Based on Non-linear CA -- 3 Preliminaries -- 3.1 Notation -- 3.2 Verifiable Delay Function -- 3.3 Cellular Automata -- 4 VDF Based on Cellular Automata -- 4.1 The Setup(1,T) Algorithm -- 4.2 The Eval(pp,x) Algorithm 001472269 5058_ $$a5 Conclusion -- References -- MILP Modeling of S-box: Divide and Merge Approach -- 1 Introduction -- 2 MILP Modeling of S-boxes -- 2.1 Generating Linear Inequalities of DDT -- 2.2 Inequality Minimization Using Impossible Transitions -- 2.3 Existing Improvements in Inequality Minimization -- 2.4 Inequality Minimization: Divide and Merge Approach -- 3 Experimental Results: 4-Bit and 5-Bit S-boxes -- 3.1 Divide and Merge Approach: k=2 -- 3.2 Divide and Merge Approach: k=3 -- 4 Conclusion -- References -- A Relation Between Properties of S-box and Linear Inequalities of DDT -- 1 Introduction 001472269 5058_ $$a2 Non-linear S-boxes -- 2.1 Properties of S-box -- 3 Methods for Construction and Minimization of Linear Inequalities of DDT -- 3.1 H-representation of Convex Hull -- 3.2 Boolean Logic Minimization Tools-Logic Friday, MILES -- 3.3 Limitation of Convex Hull Approach and Logic Friday Tool -- 4 Results -- 4.1 Experiments -- 4.2 Relation Between Boomerang Uniformity and Number of Linear Inequalities -- 5 Conclusion -- References -- Damage Level Estimation of Rubble-Mound Breakwaters Using Deep Artificial Neural Network -- 1 Introduction -- 2 Deep Artificial Neural Network -- 3 Dataset 001472269 5058_ $$a4 Development of the Deep ANN-Based Damage Level Estimation Model -- 5 Results and Discussion -- 5.1 Performance Analysis and Model Accuracy -- 5.2 Comparison of the Proposed Deep ANN Model with the Existing ANN-Based Damage Level Estimation Model -- 6 Conclusion -- References -- Facial Image Manipulation Detection Using Cellular Automata and Transfer Learning -- 1 Introduction -- 2 Digital Image Manipulation Detection -- 3 Results -- 3.1 Experimental Data -- 3.2 Application Previews -- 3.3 Performance Metrics of the Proposed Solution -- 3.4 Comparison with Other Works -- 4 Conclusion 001472269 506__ $$aAccess limited to authorized users. 001472269 520__ $$aThis book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 68 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology. 001472269 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 14, 2023). 001472269 650_0 $$aComputer science$$xMathematics$$vCongresses. 001472269 655_0 $$aElectronic books. 001472269 7001_ $$aGiri, Debasis. 001472269 7001_ $$aGollmann, Dieter. 001472269 7001_ $$aPonnusamy, S. 001472269 7001_ $$aKouichi, Sakurai. 001472269 7001_ $$aStanimirović, Predrag. 001472269 7001_ $$aSahoo, J. K. 001472269 77608 $$iPrint version:$$aGiri, Debasis$$tProceedings of the Ninth International Conference on Mathematics and Computing$$dSingapore : Springer,c2023$$z9789819930791 001472269 830_0 $$aLecture notes in networks and systems ;$$vv. 697. 001472269 852__ $$bebk 001472269 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-3080-7$$zOnline Access$$91397441.1 001472269 909CO $$ooai:library.usi.edu:1472269$$pGLOBAL_SET 001472269 980__ $$aBIB 001472269 980__ $$aEBOOK 001472269 982__ $$aEbook 001472269 983__ $$aOnline 001472269 994__ $$a92$$bISE