Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers / [electronic resource] : edited by Seokhie Hong, Jong Hwan Park. - 1st ed. 2017. - XVI, 351 p. 31 illus. online resource. - Security and Cryptology ; Lecture Notes in Computer Science 10157 10157 . - Security and Cryptology ; 10157 Lecture Notes in Computer Science ; 10157 .

Protocols -- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA -- Lattice Cryptography -- Practical post-quantum public key cryptosystem based on LWE -- Analysis of Error Terms of Signatures Based on Learning with Errors -- Encryption -- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups -- Lossy Key Encapsulation Mechanism and Its Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure Broadcast Encryption with Dealership -- Implementation and Algorithms -- A new algorithm for residue multiplication modulo $2^-1$ -- Enhancing Data Parallelism of Fully Homomorphic Encryption -- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication -- Signatures (and Protocol) -- Revisiting the Cubic UOV Signature Scheme -- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model -- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness -- Analysis -- Improved Results on Cryptanalysis of Prime Power RSA -- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks -- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round -- On the Effectiveness of Code-reuse based Android Application Obfuscation.

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. .

9783319531779

10.1007/978-3-319-53177-9 doi


Computer security.
Data protection.
Data encryption (Computer science).
Management information systems.
Computer science.
Systems and Data Security.
Security.
Cryptology.
Management of Computing and Information Systems.

QA76.9.A25

005.8
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha