Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers
| 000 | 00000nam u2200205 a 4500 | |
| 001 | 000045969138 | |
| 005 | 20190814094338 | |
| 008 | 190128s2017 sz a b 101 0 eng d | |
| 020 | ▼a 9783319531762 | |
| 040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
| 082 | 0 4 | ▼a 005.8 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b I434 | |
| 245 | 0 0 | ▼a Information security and cryptology -- ICISC 2016 : ▼b 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers / ▼c Seokhie Hong, Jong Hwan Park (eds.). |
| 246 | 3 0 | ▼a ICISC 2016 |
| 260 | ▼a Cham, Switzerland : ▼b Springer, ▼c 2017. | |
| 300 | ▼a xvi, 349 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a Lecture notes in computer science ; ▼v 10157 |
| 490 | 1 | ▼a LNCS sublibrary ; ▼v SL 4 |
| 490 | 1 | ▼a Security and cryptology |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security ▼v Congresses. |
| 650 | 0 | ▼a Data encryption (Computer science) ▼v Congresses. |
| 700 | 1 | ▼a Hong, Seokhie. |
| 700 | 1 | ▼a Park, Jong Hwan. |
| 776 | 0 8 | ▼i Online version: ▼t Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers ▼z 9783319531779 ▼w (211009) 000045993578 |
| 830 | 0 | ▼a Lecture notes in computer science ; ▼v 10157. |
| 830 | 0 | ▼a LNCS sublibrary ; ▼v SL 4. |
| 830 | 0 | ▼a Security and cryptology. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 중앙도서관/서고6층/ | 청구기호 005.8 I434 | 등록번호 111803758 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2 {521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.
정보제공 :
목차
Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2^{521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.
정보제공 :
