E-Book, Englisch, Band 10157, 351 Seiten, eBook
Hong / Park Information Security and Cryptology – ICISC 2016
1. Auflage 2017
ISBN: 978-3-319-53177-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
E-Book, Englisch, Band 10157, 351 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-319-53177-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2^{521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.-New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.