1 option
Information Security and Cryptology - ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers / edited by Howon Kim, Dong-Chan Kim.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10779.
- Security and Cryptology ; 10779
- Language:
- English
- Subjects (All):
- Computer security.
- Data encryption (Computer science).
- Artificial intelligence.
- Systems and Data Security.
- Cryptology.
- Artificial Intelligence.
- Local Subjects:
- Systems and Data Security.
- Cryptology.
- Artificial Intelligence.
- Physical Description:
- 1 online resource (XIII, 369 pages) : 58 illustrations.
- Edition:
- First edition 2018.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- System Details:
- text file PDF
- Summary:
- This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. .
- Contents:
- SYMMETRIC KEY ENCRYPTION
- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
- Security of Stateful Order-Preserving Encryption
- HOMOMORPHIC ENCRYPTION
- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED
- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
- BROADCAST ENCRYPTION
- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
- Recipient Revocable Broadcast Encryption with Dealership
- ELLIPTIC CURVE
- Solving 114-bit ECDLP for a Barreto-Naehrig Curve
- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
- SIGNATURE AND PROTOCOL
- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
- Security Analysis of Improved Cubic UOV Signature Schemes
- NETWORK AND SYSTEM SECURITY
- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
- Reading Network Packets as a Natural Language for Intrusion Detection
- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-78556-1
- 9783319785561
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.