Vorliegende Sprache |
eng |
ISBN |
978-3-319-53176-2 |
Name |
Hong, Seokhie ¬[Hrsg.]¬ |
Park, Jong Hwan ¬[Hrsg.]¬ |
Name ANZEIGE DER KETTE |
Park, Jong Hwan ¬[Hrsg.]¬ |
T I T E L |
Information Security and Cryptology – ICISC 2016 |
Zusatz zum Titel |
19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers |
Verlagsort |
Cham |
Verlag |
Springer |
Erscheinungsjahr |
2017 |
2017 |
Umfang |
Online-Ressource (XVI, 351 p. 31 illus, online resource) |
Reihe |
Lecture Notes in Computer Science ; 10157 |
Lecture notes in computer science |
Band |
10157 |
Titelhinweis |
Druckausg.ISBN: 978-3-319-53176-2 |
Printed editionISBN: 978-3-319-53176-2 |
ISBN |
ISBN 978-3-319-53177-9 |
Klassifikation |
*68-06 |
94-06 |
68P25 |
94A60 |
00B25 |
UR |
UTN |
COM053000 |
005.8 |
QA76.9.A25 |
Kurzbeschreibung |
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis |
2. Kurzbeschreibung |
Protocols -- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA -- Lattice Cryptography -- Practical post-quantum public key cryptosystem based on LWE -- Analysis of Error Terms of Signatures Based on Learning with Errors -- Encryption -- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups -- Lossy Key Encapsulation Mechanism and Its Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure Broadcast Encryption with Dealership -- Implementation and Algorithms -- A new algorithm for residue multiplication modulo $2^{521}-1$ -- Enhancing Data Parallelism of Fully Homomorphic Encryption -- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication -- Signatures (and Protocol) -- Revisiting the Cubic UOV Signature Scheme -- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model -- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness -- Analysis -- Improved Results on Cryptanalysis of Prime Power RSA -- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks -- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round -- On the Effectiveness of Code-reuse based Android Application Obfuscation |
1. Schlagwortkette |
Informatik |
Datenschutz |
Chiffrierung |
ANZEIGE DER KETTE |
Informatik -- Datenschutz -- Chiffrierung |
SWB-Titel-Idn |
485259141 |
Signatur |
Springer E-Book |
Bemerkungen |
Elektronischer Volltext - Campuslizenz |
Elektronische Adresse |
$uhttp://dx.doi.org/10.1007/978-3-319-53177-9 |
Internetseite / Link |
Volltext |
Siehe auch |
Cover |
Siehe auch |
Inhaltstext |