Information Security and Cryptology – ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hong, Seokhie. (Editor ), Park, Jong Hwan. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10157
Materias:
Tabla de Contenidos:
  • Protocols
  • Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
  • Lattice Cryptography
  • Practical post-quantum public key cryptosystem based on LWE
  • Analysis of Error Terms of Signatures Based on Learning with Errors
  • Encryption
  • Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups
  • Lossy Key Encapsulation Mechanism and Its Applications
  • Expanded Framework for Dual System Encryption and its Application
  • Adaptively Secure Broadcast Encryption with Dealership
  • Implementation and Algorithms
  • A new algorithm for residue multiplication modulo $2 {521}-1$
  • Enhancing Data Parallelism of Fully Homomorphic Encryption
  • An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication
  • Signatures (and Protocol)
  • Revisiting the Cubic UOV Signature Scheme
  • Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model
  • New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
  • Analysis
  • Improved Results on Cryptanalysis of Prime Power RSA
  • On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks
  • Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
  • On the Effectiveness of Code-reuse based Android Application Obfuscation.