Information Security and Cryptology

13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers

  • Xiaofeng Chen
  • Dongdai Lin
  • Moti Yung
Conference proceedings Inscrypt 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10726)

Also part of the Security and Cryptology book sub series (LNSC, volume 10726)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Keynote Speeches

    1. Front Matter
      Pages 1-1
    2. Elisa Bertino
      Pages 3-10
    3. Mirosław Kutyłowski
      Pages 11-20
  3. Cryptographic Protocols and Algorithms

    1. Front Matter
      Pages 25-25
    2. Zheng Zhang, Fangguo Zhang, Huang Zhang
      Pages 27-43
    3. Haibo Tian, Liqing Fu, Jiejie He
      Pages 81-98
    4. Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
      Pages 99-116
    5. Xiaoyang He, Wei Yu, Kunpeng Wang
      Pages 117-138
  4. Digital Signatures

    1. Front Matter
      Pages 139-139
    2. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide
      Pages 141-156
    3. Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, Ru Meng
      Pages 180-195
    4. Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng
      Pages 196-208
  5. Encryption

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.

The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Keywords

authentication ciphertexts cloud computing computer crime computer systems cryptography data mining data privacy data security electronic document identification systems encryption internet privacy preserving public key cryptography Public keys (PK) random oracle model secret key security systems software engineering user interfaces

Editors and affiliations

  • Xiaofeng Chen
    • 1
  • Dongdai Lin
    • 2
  • Moti Yung
    • 3
  1. 1.Xidian UniversityXi’anChina
  2. 2.SKLOIS, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  3. 3.Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-75160-3
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-75159-7
  • Online ISBN 978-3-319-75160-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace