Information Security and Cryptology - ICISC 2017
20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
(Sprache: Englisch)
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.
The total of 20 papers presented in this volume were...
The total of 20 papers presented in this volume were...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
53.49 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenlose Rücksendung
- Ratenzahlung möglich
Produktdetails
Produktinformationen zu „Information Security and Cryptology - ICISC 2017 “
Klappentext zu „Information Security and Cryptology - ICISC 2017 “
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.
Inhaltsverzeichnis zu „Information Security and Cryptology - ICISC 2017 “
SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.Bibliographische Angaben
- 2018, 1st ed. 2018, XIII, 369 Seiten, Maße: 15,6 x 23,7 cm, Kartoniert (TB), Englisch
- Herausgegeben: Howon Kim, Dong-Chan Kim
- Verlag: Springer, Berlin
- ISBN-10: 3319785559
- ISBN-13: 9783319785554
Sprache:
Englisch
Kommentar zu "Information Security and Cryptology - ICISC 2017"
0 Gebrauchte Artikel zu „Information Security and Cryptology - ICISC 2017“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Information Security and Cryptology - ICISC 2017".
Kommentar verfassen