My Account Log in

1 option

Information Security and Cryptology - ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers / edited by Howon Kim, Dong-Chan Kim.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Kim, Howon, editor.
Kim, Dong-Chan, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10779.
Security and Cryptology ; 10779
Language:
English
Subjects (All):
Computer security.
Data encryption (Computer science).
Artificial intelligence.
Systems and Data Security.
Cryptology.
Artificial Intelligence.
Local Subjects:
Systems and Data Security.
Cryptology.
Artificial Intelligence.
Physical Description:
1 online resource (XIII, 369 pages) : 58 illustrations.
Edition:
First edition 2018.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. .
Contents:
SYMMETRIC KEY ENCRYPTION
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
Security of Stateful Order-Preserving Encryption
HOMOMORPHIC ENCRYPTION
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED
Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
BROADCAST ENCRYPTION
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
Recipient Revocable Broadcast Encryption with Dealership
ELLIPTIC CURVE
Solving 114-bit ECDLP for a Barreto-Naehrig Curve
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
SIGNATURE AND PROTOCOL
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
Security Analysis of Improved Cubic UOV Signature Schemes
NETWORK AND SYSTEM SECURITY
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
Reading Network Packets as a Natural Language for Intrusion Detection
Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
Other Format:
Printed edition:
ISBN:
978-3-319-78556-1
9783319785561
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account