Coverart for item
The Resource Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers, Howon Kim, Dong-Chan Kim (eds.)

Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers, Howon Kim, Dong-Chan Kim (eds.)

Label
Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers
Title
Information security and cryptology -- ICISC 2017
Title remainder
20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers
Statement of responsibility
Howon Kim, Dong-Chan Kim (eds.)
Title variation
ICISC 2017
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2017
http://bibfra.me/vocab/lite/meetingName
ICISC (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Kim, Howon
  • Kim, Dong-Chan
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
10779
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Computer Science
  • Systems and Data Security
  • Data Encryption
  • Artificial Intelligence (incl. Robotics)
Label
Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers, Howon Kim, Dong-Chan Kim (eds.)
Instantiates
Publication
Note
Includes author index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
SYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures -- case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments -- Reading Network Packets as a Natural Language for Intrusion Detection -- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network
Control code
SPR1029606366
Dimensions
unknown
Extent
1 online resource (xiii, 369 pages)
File format
unknown
Form of item
online
Isbn
9783319785561
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-78556-1
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1029606366
  • (OCoLC)1029606366
Label
Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers, Howon Kim, Dong-Chan Kim (eds.)
Publication
Note
Includes author index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
SYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures -- case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments -- Reading Network Packets as a Natural Language for Intrusion Detection -- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network
Control code
SPR1029606366
Dimensions
unknown
Extent
1 online resource (xiii, 369 pages)
File format
unknown
Form of item
online
Isbn
9783319785561
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-78556-1
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1029606366
  • (OCoLC)1029606366

Library Locations

Processing Feedback ...