Information Security and Cryptology – ICISC 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
Название: Information Security and Cryptology – ICISC 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers Автор: Howon Kim, Dong-Chan Kim Издательство: Springer Год: 2018 ISBN: 9783319785561 Формат: pdf Страниц: XIII, 369 Размер: 14,3 mb Язык: English
The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, and Daesung Kwon
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik Mohamed Tolba and Amr M. Youssef
Security of Stateful Order-Preserving Encryption Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim
Homomorphic Encryption
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption Shuaijianni Xu, Yan He, and Liang Feng Zhang
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, and Olivier Markowitch
Improved Key Generation Algorithm for Gentry’s Fully Homomorphic Encryption Scheme Yang Zhang, Renzhang Liu, and Dongdai Lin
Subring Homomorphic Encryption Seiko Arita and Sari Handa
Side Channel Analysis and Implementation
Novel Leakage Against Realistic Masking and Shuffling Countermeasures: Case Study on PRINCE and SEED Yoo-Seung Won, Aesun Park, and Dong-Guk Han
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers Peter Samarin and Kerstin Lemke-Rust
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, and Howon Kim
Broadcast Encryption
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles Kamalesh Acharya and Ratna Dutta
Recipient Revocable Broadcast Encryption with Dealership Joon Sik Kim, Youngkyung Lee, Jieun Eom, and Dong Hoon Lee
Elliptic Curve
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, and Sylvain Duquesne
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus Chen-Mou Cheng, Kenta Kodera, and Atsuko Miyaji
Signature and Protocol
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems Hafsa Assidi, Edoukou Berenger Ayebie, and El Mamoun Souidi
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, and Olivier Markowitch
Security Analysis of Improved Cubic UOV Signature Schemes Kyung-Ah Shim, Namhun Koo, and Cheol-Min Park
Network and System Security
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments Weizhi Meng, Wang Hao Lee, Zhe Liu, Chunhua Su, and Yan Li
Reading Network Packets as a Natural Language for Intrusion Detection Mamoru Mimura and Hidema Tanaka
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network Hyun Kwon, Hyunsoo Yoon, and Daeseon Choi
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.