Information security and cryptology ...
ICISC (Conference) (2017 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology - ICISC 2017 = 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and cryptology - ICISC 2017/ edited by Howon Kim, Dong-Chan Kim.
    其他題名: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017 : revised selected papers /
    其他題名: ICISC 2017
    其他作者: Kim, Howon.
    團體作者: ICISC (Conference)
    出版者: Cham :Springer International Publishing : : 2018.,
    面頁冊數: xiii, 369 p. :ill., digital ;24 cm.
    內容註: SYMMETRIC KEY ENCRYPTION -- CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices -- Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik -- Security of Stateful Order-Preserving Encryption -- HOMOMORPHIC ENCRYPTION -- Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption -- Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings -- Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme -- SIDE CHANNEL ANALYSIS AND IMPLEMENTATION -- Novel Leakage against Realistic Masking and Shuffling Countermeasures - case study on PRINCE and SEED -- Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers -- Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors -- BROADCAST ENCRYPTION -- Recipient Revocable Broadcast Encryption Schemes Without Random Oracles -- Recipient Revocable Broadcast Encryption with Dealership -- ELLIPTIC CURVE -- Solving 114-bit ECDLP for a Barreto-Naehrig Curve -- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus -- SIGNATURE AND PROTOCOL -- Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems -- On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices -- Security Analysis of Improved Cubic UOV Signature Schemes -- NETWORK AND SYSTEM SECURITY -- Evaluating the Impact of Juice Filming Charging Attack in Practical Environments -- Reading Network Packets as a Natural Language for Intrusion Detection -- Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
    Contained By: Springer eBooks
    標題: Computer security - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-3-319-78556-1
    ISBN: 9783319785561
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入