Fr. 70.00

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

List of contents

SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.-  SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.

Summary

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.