Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. Th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kim, Howon (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Kim, Dong-Chan (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Security and Cryptology ; 10779
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • SYMMETRIC KEY ENCRYPTION
  • CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
  • Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
  • Security of Stateful Order-Preserving Encryption
  • HOMOMORPHIC ENCRYPTION
  • Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
  • Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
  • Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
  • SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
  • Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED
  • Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
  • Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
  • BROADCAST ENCRYPTION
  • Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
  • Recipient Revocable Broadcast Encryption with Dealership
  • ELLIPTIC CURVE
  • Solving 114-bit ECDLP for a Barreto-Naehrig Curve
  • On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
  • SIGNATURE AND PROTOCOL
  • Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
  • On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
  • Security Analysis of Improved Cubic UOV Signature Schemes
  • NETWORK AND SYSTEM SECURITY
  • Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
  • Reading Network Packets as a Natural Language for Intrusion Detection
  • Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.