Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security and Cryptology – ICISC 2017 -

Information Security and Cryptology – ICISC 2017

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

Howon Kim, Dong-Chan Kim (Herausgeber)

Buch | Softcover
XIII, 369 Seiten
2018 | 1st ed. 2018
Springer International Publishing (Verlag)
978-3-319-78555-4 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.-  SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIII, 369 p. 58 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 581 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Applications • Artificial Intelligence • authentication • Computer Science • conference proceedings • cryptography • Data Security • electronic document identification systems • Encryption • Informatics • Public Key Cryptography • Research
ISBN-10 3-319-78555-9 / 3319785559
ISBN-13 978-3-319-78555-4 / 9783319785554
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95