LEADER 04496nam 22006855 450 001 996465744003316 005 20200703101853.0 010 $a3-319-53177-8 024 7 $a10.1007/978-3-319-53177-9 035 $a(CKB)3710000001079934 035 $a(DE-He213)978-3-319-53177-9 035 $a(MiAaPQ)EBC6281399 035 $a(MiAaPQ)EBC5578214 035 $a(Au-PeEL)EBL5578214 035 $a(OCoLC)972734067 035 $a(PPN)198868502 035 $a(EXLCZ)993710000001079934 100 $a20170208d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Cryptology ? ICISC 2016$b[electronic resource] $e19th International Conference, Seoul, South Korea, November 30 ? December 2, 2016, Revised Selected Papers /$fedited by Seokhie Hong, Jong Hwan Park 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVI, 351 p. 31 illus.) 225 1 $aSecurity and Cryptology ;$v10157 311 $a3-319-53176-X 327 $aProtocols -- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA -- Lattice Cryptography -- Practical post-quantum public key cryptosystem based on LWE -- Analysis of Error Terms of Signatures Based on Learning with Errors -- Encryption -- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups -- Lossy Key Encapsulation Mechanism and Its Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure Broadcast Encryption with Dealership -- Implementation and Algorithms -- A new algorithm for residue multiplication modulo $2^{521}-1$ -- Enhancing Data Parallelism of Fully Homomorphic Encryption -- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication -- Signatures (and Protocol) -- Revisiting the Cubic UOV Signature Scheme -- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model -- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness -- Analysis -- Improved Results on Cryptanalysis of Prime Power RSA -- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks -- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round -- On the Effectiveness of Code-reuse based Android Application Obfuscation. 330 $aThis book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. . 410 0$aSecurity and Cryptology ;$v10157 606 $aComputer security 606 $aData protection 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData protection. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aSecurity. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aHong$b Seokhie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPark$b Jong Hwan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465744003316 996 $aInformation Security and Cryptology ? ICISC 2016$92808350 997 $aUNISA