Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. Th...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Σειρά: | Security and Cryptology ;
10779 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- SYMMETRIC KEY ENCRYPTION
- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
- Security of Stateful Order-Preserving Encryption
- HOMOMORPHIC ENCRYPTION
- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED
- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
- BROADCAST ENCRYPTION
- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
- Recipient Revocable Broadcast Encryption with Dealership
- ELLIPTIC CURVE
- Solving 114-bit ECDLP for a Barreto-Naehrig Curve
- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
- SIGNATURE AND PROTOCOL
- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
- Security Analysis of Improved Cubic UOV Signature Schemes
- NETWORK AND SYSTEM SECURITY
- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
- Reading Network Packets as a Natural Language for Intrusion Detection
- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.