Information Security and Cryptology - ICISC 2017
Editat de Howon Kim, Dong-Chan Kimen Limba Engleză Paperback – 22 mar 2018
Preț: 325.47 lei
Preț vechi: 406.84 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.59€ • 67.53$ • 50.58£
57.59€ • 67.53$ • 50.58£
Carte tipărită la comandă
Livrare economică 09-23 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319785554
ISBN-10: 3319785559
Pagini: 384
Ilustrații: XIII, 369 p. 58 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:1st edition 2018
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319785559
Pagini: 384
Ilustrații: XIII, 369 p. 58 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:1st edition 2018
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
SYMMETRIC KEY ENCRYPTION.- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.- Security of Stateful Order-Preserving Encryption.- HOMOMORPHIC ENCRYPTION.- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption.- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme.- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION.- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED.- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers.- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.- BROADCAST ENCRYPTION.- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.- Recipient Revocable Broadcast Encryption with Dealership.- ELLIPTIC CURVE.- Solving 114-bit ECDLP for a Barreto-Naehrig Curve.- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus.- SIGNATURE AND PROTOCOL.- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems.- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.- Security Analysis of Improved Cubic UOV Signature Schemes.- NETWORK AND SYSTEM SECURITY.- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.- Reading Network Packets as a Natural Language for Intrusion Detection.- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.