HOME > 상세정보

상세정보

Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers

Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers

자료유형
단행본
개인저자
Hong, Seokhie. Park, Jong Hwan.
서명 / 저자사항
Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers / Seokhie Hong, Jong Hwan Park (eds.).
발행사항
Cham, Switzerland :   Springer,   2017.  
형태사항
xvi, 349 p. : ill. ; 24 cm.
기타형태 저록
Online version:   Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers   9783319531779   (211009) 000045993578  
총서사항
Lecture notes in computer science ;10157
ISBN
9783319531762
일반주기
Online version: Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers 9783319531779
서지주기
Includes bibliographical references and index.
일반주제명
Computer security --Congresses. Data encryption (Computer science) --Congresses.
000 00000nam u2200205 a 4500
001 000045969138
005 20190814094338
008 190128s2017 sz a b 101 0 eng d
020 ▼a 9783319531762
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b I434
245 0 0 ▼a Information security and cryptology -- ICISC 2016 : ▼b 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers / ▼c Seokhie Hong, Jong Hwan Park (eds.).
246 3 0 ▼a ICISC 2016
260 ▼a Cham, Switzerland : ▼b Springer, ▼c 2017.
300 ▼a xvi, 349 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science ; ▼v 10157
490 1 ▼a LNCS sublibrary ; ▼v SL 4
490 1 ▼a Security and cryptology
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
700 1 ▼a Hong, Seokhie.
700 1 ▼a Park, Jong Hwan.
776 0 8 ▼i Online version: ▼t Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers ▼z 9783319531779 ▼w (211009) 000045993578
830 0 ▼a Lecture notes in computer science ; ▼v 10157.
830 0 ▼a LNCS sublibrary ; ▼v SL 4.
830 0 ▼a Security and cryptology.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 I434 등록번호 111803758 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2 {521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.


정보제공 : Aladin

목차

Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2^{521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)