Books+ Search Results

Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers

Title
Information Security and Cryptology – ICISC 2016 [electronic resource] : 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers / edited by Seokhie Hong, Jong Hwan Park.
ISBN
9783319531779
Publication
Cham : Springer International Publishing : Imprint: Springer, 2017.
Physical Description
XVI, 351 p. 31 illus : online resource.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. .
Variant and related titles
Springer ebooks.
Other formats
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
March 03, 2017
Series
Lecture notes in computer science ; 10157.
Lecture Notes in Computer Science, 10157
Contents
Protocols
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Lattice Cryptography
Practical post-quantum public key cryptosystem based on LWE
Analysis of Error Terms of Signatures Based on Learning with Errors
Encryption
Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
Lossy Key Encapsulation Mechanism and Its Applications
Expanded Framework for Dual System Encryption and its Application
Adaptively Secure Broadcast Encryption with Dealership
Implementation and Algorithms
A new algorithm for residue multiplication modulo $2^{521}-1$
Enhancing Data Parallelism of Fully Homomorphic Encryption
An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
Signatures (and Protocol)
Revisiting the Cubic UOV Signature Scheme
Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
Analysis
Improved Results on Cryptanalysis of Prime Power RSA
On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
On the Effectiveness of Code-reuse based Android Application Obfuscation.
Also listed under
Hong, Seokhie.
Park, Jong Hwan.
SpringerLink (Online service)
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?