<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. <br>The 23 revised full papers presented were carefully reviewed and selected from 71 subm
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
โ Scribed by Kefei Chen, Dongdai Lin, Moti Yung (eds.)
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 545
- Series
- Lecture Notes in Computer Science 10143
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.
The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
โฆ Table of Contents
Front Matter....Pages I-XIII
Front Matter....Pages 1-1
Biclique Attack of Block Cipher SKINNY....Pages 3-17
Improved Differential Cryptanalysis of CAST-128 and CAST-256....Pages 18-32
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher....Pages 33-46
Impossible Differentials of SPN Ciphers....Pages 47-63
Transposition of AES Key Schedule....Pages 64-83
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds....Pages 84-102
Front Matter....Pages 103-116
Achieving IND-CCA Security for Functional Encryption for Inner Products....Pages 117-117
An Improved Analysis on Three Variants of the RSA Cryptosystem....Pages 119-139
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks....Pages 140-149
Front Matter....Pages 150-165
On Privacy-Preserving Biometric Authentication....Pages 167-167
A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems....Pages 169-186
Identity-Based Blind Signature from Lattices in Standard Model....Pages 187-204
Front Matter....Pages 205-218
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers....Pages 219-219
Fully Homomorphic Encryption for Point Numbers....Pages 221-242
Front Matter....Pages 243-252
Bounded-Retrieval Model with Keys Derived from Private Data....Pages 253-270
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation....Pages 271-271
Codes for Detection of Limited View Algebraic Tampering....Pages 273-290
Front Matter....Pages 291-308
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography....Pages 309-320
Front Matter....Pages 321-321
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function....Pages 323-342
Front Matter....Pages 321-321
Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial....Pages 343-354
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks....Pages 355-355
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model....Pages 357-366
Front Matter....Pages 367-385
Constructing Isogenies on Extended Jacobi Quartic Curves....Pages 386-400
Front Matter....Pages 401-401
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework....Pages 403-415
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment....Pages 416-427
Video Steganalysis Based on Centralized Error Detection in Spatial Domain....Pages 429-429
Log Your Car: Reliable Maintenance Services Record....Pages 431-450
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter....Pages 451-471
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure....Pages 472-483
Back Matter....Pages 484-504
....Pages 505-525
โฆ Subjects
Systems and Data Security;Software Engineering;Data Encryption;Computers and Society;Computer Communication Networks;Information Systems Applications (incl. Internet)
๐ SIMILAR VOLUMES
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. <br>The 23 revised full papers presented were carefully reviewed and selected from 71 subm
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015.</p><p>The 27 revised full papers presented were carefully reviewed and selected from 79
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submiss
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013.</p><p>The 21 revised full papers presented together with 4 short papers were carefull