Kim | Information Security and Cryptology - ICISC 2017 | Buch | 978-3-319-78555-4 | sack.de

Buch, Englisch, 369 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5796 g

Reihe: Security and Cryptology

Kim

Information Security and Cryptology - ICISC 2017

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
1. Auflage 2018
ISBN: 978-3-319-78555-4
Verlag: Springer International Publishing

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

Buch, Englisch, 369 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5796 g

Reihe: Security and Cryptology

ISBN: 978-3-319-78555-4
Verlag: Springer International Publishing


This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

Kim Information Security and Cryptology - ICISC 2017 jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.-  SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.