© 2017

Information Security and Cryptology – ICISC 2016

19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers

  • Seokhie Hong
  • Jong Hwan Park
Conference proceedings ICISC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10157)

Also part of the Security and Cryptology book sub series (LNSC, volume 10157)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Protocols

    1. Front Matter
      Pages 1-1
    2. Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg
      Pages 3-27
    3. Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
      Pages 28-48
  3. Lattice Cryptography

    1. Front Matter
      Pages 49-49
    2. Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son
      Pages 51-74
    3. Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung et al.
      Pages 75-97
  4. Encryption

    1. Front Matter
      Pages 99-99
    2. Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue
      Pages 126-144
    3. Minqian Wang, Zhenfeng Zhang
      Pages 145-160
    4. Kamalesh Acharya, Ratna Dutta
      Pages 161-177
  5. Implementation and Algorithms

    1. Front Matter
      Pages 179-179
    2. Paulo Martins, Leonel Sousa
      Pages 194-207
    3. Md. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne
      Pages 208-219
  6. Signatures (and Protocol)

    1. Front Matter
      Pages 221-221
    2. Dung H. Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
      Pages 223-238
    3. Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue
      Pages 239-253

About these proceedings


This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. 


authentication block ciphers cryptanalysis cryptography cryptology digital signatures encryption information security post quantum cryptography privacy preservation public key cryptography public keys random oracle model security security protocols signature schemes software engineering user privacy

Editors and affiliations

  • Seokhie Hong
    • 1
  • Jong Hwan Park
    • 2
  1. 1.CIST, Korea UniversitySeoulKorea (Republic of)
  2. 2.Sangmyung UniversitySeoulKorea (Republic of)

Bibliographic information

  • Book Title Information Security and Cryptology – ICISC 2016
  • Book Subtitle 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
  • Editors Seokhie Hong
    Jong Hwan Park
  • Series Title Lecture Notes in Computer Science
  • Series Abbreviated Title Lect.Notes Computer
  • DOI
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-53176-2
  • eBook ISBN 978-3-319-53177-9
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XVI, 351
  • Number of Illustrations 31 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Management of Computing and Information Systems
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment