04471nam 22006855 450 991048490130332120200703101853.03-319-53177-810.1007/978-3-319-53177-9(CKB)3710000001079934(DE-He213)978-3-319-53177-9(MiAaPQ)EBC6281399(MiAaPQ)EBC5578214(Au-PeEL)EBL5578214(OCoLC)972734067(PPN)198868502(EXLCZ)99371000000107993420170208d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /edited by Seokhie Hong, Jong Hwan Park1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XVI, 351 p. 31 illus.) Security and Cryptology ;101573-319-53176-X Protocols -- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA -- Lattice Cryptography -- Practical post-quantum public key cryptosystem based on LWE -- Analysis of Error Terms of Signatures Based on Learning with Errors -- Encryption -- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups -- Lossy Key Encapsulation Mechanism and Its Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure Broadcast Encryption with Dealership -- Implementation and Algorithms -- A new algorithm for residue multiplication modulo $2^{521}-1$ -- Enhancing Data Parallelism of Fully Homomorphic Encryption -- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication -- Signatures (and Protocol) -- Revisiting the Cubic UOV Signature Scheme -- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model -- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness -- Analysis -- Improved Results on Cryptanalysis of Prime Power RSA -- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks -- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round -- On the Effectiveness of Code-reuse based Android Application Obfuscation.This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. .Security and Cryptology ;10157Computer securityData protectionData encryption (Computer science)Management information systemsComputer scienceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer security.Data protection.Data encryption (Computer science).Management information systems.Computer science.Systems and Data Security.Security.Cryptology.Management of Computing and Information Systems.005.8Hong Seokhieedthttp://id.loc.gov/vocabulary/relators/edtPark Jong Hwanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484901303321Information Security and Cryptology – ICISC 20162808350UNINA