Information Security and Cryptology - ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. Th...
| Corporate Author: | |
|---|---|
| Other Authors: | , |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
| Edition: | 1st ed. 2018. |
| Series: | Security and Cryptology ;
10779 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- SYMMETRIC KEY ENCRYPTION
- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
- Security of Stateful Order-Preserving Encryption
- HOMOMORPHIC ENCRYPTION
- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED
- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
- BROADCAST ENCRYPTION
- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
- Recipient Revocable Broadcast Encryption with Dealership
- ELLIPTIC CURVE
- Solving 114-bit ECDLP for a Barreto-Naehrig Curve
- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
- SIGNATURE AND PROTOCOL
- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
- Security Analysis of Improved Cubic UOV Signature Schemes
- NETWORK AND SYSTEM SECURITY
- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
- Reading Network Packets as a Natural Language for Intrusion Detection
- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.