Information Security and Cryptology – ICISC 2017

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

  • Howon Kim
  • Dong-Chan Kim
Conference proceedings ICISC 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10779)

Also part of the Security and Cryptology book sub series (LNSC, volume 10779)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Symmetric Key Encryption

    1. Front Matter
      Pages 1-1
    2. Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon
      Pages 3-25
    3. Mohamed Tolba, Amr M. Youssef
      Pages 26-38
    4. Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim
      Pages 39-56
  3. Homomorphic Encryption

    1. Front Matter
      Pages 57-57
    2. Shuaijianni Xu, Yan He, Liang Feng Zhang
      Pages 59-70
    3. Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch
      Pages 71-92
    4. Seiko Arita, Sari Handa
      Pages 112-136
  4. Side Channel Analysis and Implementation

    1. Front Matter
      Pages 137-137
    2. Yoo-Seung Won, Aesun Park, Dong-Guk Han
      Pages 139-154
    3. Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim
      Pages 175-188
  5. Broadcast Encryption

    1. Front Matter
      Pages 189-189
    2. Joon Sik Kim, Youngkyung Lee, Jieun Eom, Dong Hoon Lee
      Pages 214-228
  6. Elliptic Curve

    1. Front Matter
      Pages 229-229
    2. Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara et al.
      Pages 231-244
  7. Signature and Protocol

    1. Front Matter
      Pages 265-265
    2. Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi
      Pages 267-283
    3. Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch
      Pages 284-309
    4. Kyung-Ah Shim, Namhun Koo, Cheol-Min Park
      Pages 310-324
  8. Network and System Security

    1. Front Matter
      Pages 325-325
    2. Weizhi Meng, Wang Hao Lee, Zhe Liu, Chunhua Su, Yan Li
      Pages 327-338
    3. Hyun Kwon, Hyunsoo Yoon, Daeseon Choi
      Pages 351-367
  9. Back Matter
    Pages 369-369

About these proceedings


This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 


artificial intelligence authentication cryptography data security electronic document identification systems encryption public key cryptography

Editors and affiliations

  • Howon Kim
    • 1
  • Dong-Chan Kim
    • 2
  1. 1.Pusan National UniversityBusanKorea (Republic of)
  2. 2.Kookmin UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-78555-4
  • Online ISBN 978-3-319-78556-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment