Advertisement

Information Security and Cryptology – ICISC 2016

19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers

  • Seokhie Hong
  • Jong Hwan Park
Conference proceedings ICISC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10157)

Also part of the Security and Cryptology book sub series (LNSC, volume 10157)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Protocols

    1. Front Matter
      Pages 1-1
    2. Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg
      Pages 3-27
    3. Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
      Pages 28-48
  3. Lattice Cryptography

    1. Front Matter
      Pages 49-49
    2. Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son
      Pages 51-74
    3. Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung et al.
      Pages 75-97
  4. Encryption

    1. Front Matter
      Pages 99-99
    2. Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue
      Pages 126-144
    3. Minqian Wang, Zhenfeng Zhang
      Pages 145-160
    4. Kamalesh Acharya, Ratna Dutta
      Pages 161-177
  5. Implementation and Algorithms

    1. Front Matter
      Pages 179-179
    2. Paulo Martins, Leonel Sousa
      Pages 194-207
    3. Md. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne
      Pages 208-219
  6. Signatures (and Protocol)

    1. Front Matter
      Pages 221-221
    2. Dung H. Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
      Pages 223-238
    3. Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue
      Pages 239-253
  7. Analysis

    1. Front Matter
      Pages 285-285
    2. Liqiang Peng, Lei Hu, Yao Lu
      Pages 287-303
    3. Jingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng
      Pages 317-332
    4. Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin, Debin Gao
      Pages 333-349
  8. Back Matter
    Pages 351-351

About these proceedings

Introduction

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. 

Keywords

authentication block ciphers cryptanalysis cryptography cryptology digital signatures encryption information security post quantum cryptography privacy preservation public key cryptography public keys random oracle model security security protocols signature schemes software engineering user privacy

Editors and affiliations

  • Seokhie Hong
    • 1
  • Jong Hwan Park
    • 2
  1. 1.CIST, Korea UniversitySeoulKorea (Republic of)
  2. 2.Sangmyung UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-53177-9
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-53176-2
  • Online ISBN 978-3-319-53177-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering