<span>This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology β ICISC 2023, held in Seoul, South Korea, during November 29βDecember 1, 2023<br>The 31 full papers included in this book were caref
Information Security and Cryptology β ICISC 2017
β Scribed by Howon Kim, Dong-Chan Kim
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 372
- Series
- Lecture Notes in Computer Science 10779
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.
The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.
β¦ Table of Contents
Front Matter ....Pages I-XIII
Front Matter ....Pages 1-1
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices (Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon)....Pages 3-25
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik (Mohamed Tolba, Amr M. Youssef)....Pages 26-38
Security of Stateful Order-Preserving Encryption (Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim)....Pages 39-56
Front Matter ....Pages 57-57
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption (Shuaijianni Xu, Yan He, Liang Feng Zhang)....Pages 59-70
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings (Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch)....Pages 71-92
Improved Key Generation Algorithm for Gentryβs Fully Homomorphic Encryption Scheme (Yang Zhang, Renzhang Liu, Dongdai Lin)....Pages 93-111
Subring Homomorphic Encryption (Seiko Arita, Sari Handa)....Pages 112-136
Front Matter ....Pages 137-137
Novel Leakage Against Realistic Masking and Shuffling Countermeasures (Yoo-Seung Won, Aesun Park, Dong-Guk Han)....Pages 139-154
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers (Peter Samarin, Kerstin Lemke-Rust)....Pages 155-174
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors (Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim)....Pages 175-188
Front Matter ....Pages 189-189
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles (Kamalesh Acharya, Ratna Dutta)....Pages 191-213
Recipient Revocable Broadcast Encryption with Dealership (Joon Sik Kim, Youngkyung Lee, Jieun Eom, Dong Hoon Lee)....Pages 214-228
Front Matter ....Pages 229-229
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve (Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara et al.)....Pages 231-244
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus (Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji)....Pages 245-263
Front Matter ....Pages 265-265
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems (Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi)....Pages 267-283
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices (Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch)....Pages 284-309
Security Analysis of Improved Cubic UOV Signature Schemes (Kyung-Ah Shim, Namhun Koo, Cheol-Min Park)....Pages 310-324
Front Matter ....Pages 325-325
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments (Weizhi Meng, Wang Hao Lee, Zhe Liu, Chunhua Su, Yan Li)....Pages 327-338
Reading Network Packets as a Natural Language for Intrusion Detection (Mamoru Mimura, Hidema Tanaka)....Pages 339-350
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network (Hyun Kwon, Hyunsoo Yoon, Daeseon Choi)....Pages 351-367
Back Matter ....Pages 369-369
β¦ Subjects
Computer Science; Systems and Data Security; Data Encryption; Artificial Intelligence (incl. Robotics)
π SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology β ICISC 2023, held in Seoul, South Korea, during November 29βDecember 1, 2023<br>The 31 full papers included in this book were caref
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of revi