Information Security and Cryptology - ICISC 2016
Editat de Seokhie Hong, Jong Hwan Parken Limba Engleză Paperback – 9 feb 2017
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.
Preț: 324.63 lei
Preț vechi: 405.79 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
57.45€ • 67.36$ • 50.45£
57.45€ • 67.36$ • 50.45£
Carte tipărită la comandă
Livrare economică 16 februarie-02 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319531762
ISBN-10: 331953176X
Pagini: 368
Ilustrații: XVI, 351 p. 31 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:1st edition 2017
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 331953176X
Pagini: 368
Ilustrații: XVI, 351 p. 31 illus.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:1st edition 2017
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.- Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2^{521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.-New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.
Caracteristici
Includes supplementary material: sn.pub/extras