Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hong, Seokhie (Επιμελητής έκδοσης), Park, Jong Hwan (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Σειρά:Lecture Notes in Computer Science, 10157
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Protocols
  • Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
  • Lattice Cryptography
  • Practical post-quantum public key cryptosystem based on LWE
  • Analysis of Error Terms of Signatures Based on Learning with Errors
  • Encryption
  • Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
  • Lossy Key Encapsulation Mechanism and Its Applications
  • Expanded Framework for Dual System Encryption and its Application
  • Adaptively Secure Broadcast Encryption with Dealership
  • Implementation and Algorithms
  • A new algorithm for residue multiplication modulo $2^{521}-1$
  • Enhancing Data Parallelism of Fully Homomorphic Encryption
  • An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
  • Signatures (and Protocol)
  • Revisiting the Cubic UOV Signature Scheme
  • Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
  • New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
  • Analysis
  • Improved Results on Cryptanalysis of Prime Power RSA
  • On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
  • Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
  • On the Effectiveness of Code-reuse based Android Application Obfuscation.