Information security and cryptology ...
ICISC (Conference) (2017 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology - ICISC 2017 = 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and cryptology - ICISC 2017/ edited by Howon Kim, Dong-Chan Kim.
    Reminder of title: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
    remainder title: ICISC 2017
    other author: Kim, Howon.
    corporate name: ICISC (Conference)
    Published: Cham :Springer International Publishing : : 2018.,
    Description: xiii, 369 p. :ill., digital ;24 cm.
    [NT 15003449]: SYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments -- Reading Network Packets as a Natural Language for Intrusion Detection -- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
    Contained By: Springer eBooks
    Subject: Computer security - Congresses. -
    Online resource: http://dx.doi.org/10.1007/978-3-319-78556-1
    ISBN: 9783319785561
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login