Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Σειρά: | Lecture Notes in Computer Science,
10157 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Protocols
- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
- Lattice Cryptography
- Practical post-quantum public key cryptosystem based on LWE
- Analysis of Error Terms of Signatures Based on Learning with Errors
- Encryption
- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
- Lossy Key Encapsulation Mechanism and Its Applications
- Expanded Framework for Dual System Encryption and its Application
- Adaptively Secure Broadcast Encryption with Dealership
- Implementation and Algorithms
- A new algorithm for residue multiplication modulo $2^{521}-1$
- Enhancing Data Parallelism of Fully Homomorphic Encryption
- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
- Signatures (and Protocol)
- Revisiting the Cubic UOV Signature Scheme
- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
- Analysis
- Improved Results on Cryptanalysis of Prime Power RSA
- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
- On the Effectiveness of Code-reuse based Android Application Obfuscation.