Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers /: 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers. (2018)
- Record Type:
- Book
- Title:
- Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers /: 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers. (2018)
- Main Title:
- Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers
- Other Titles:
- ICISC 2017
- Further Information:
- Note: Howon Kim, Dong-Chan Kim (eds.).
- Editors:
- Kim, Howon
Kim, Dong-Chan - Other Names:
- ICISC (Conference), 20th
- Contents:
- SYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures -- case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice FilmingSYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures -- case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments -- Reading Network Packets as a Natural Language for Intrusion Detection -- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xiii, 369 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Computers -- Security -- General
Computers -- Intelligence (AI) & Semantics
Coding theory & cryptology
Artificial intelligence
Computer security
Data encryption (Computer science)
Artificial intelligence
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319785561
3319785567 - Related ISBNs:
- 9783319785554
3319785559 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed March 27, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367542
- Ingest File:
- 01_345.xml