Skip to main content
  • Conference proceedings
  • © 2018

Information Security and Cryptology

13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10726)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Encryption

    1. Leveled FHE with Matrix Message Space

      • Biao Wang, Xueqing Wang, Rui Xue
      Pages 260-277
  2. Cryptanalysis and Attack

    1. Front Matter

      Pages 299-299
    2. NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries

      • Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li et al.
      Pages 301-320
    3. A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs

      • Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou
      Pages 321-341
    4. Cryptanalysis of Acorn in Nonce-Reuse Setting

      • Xiaojuan Zhang, Dongdai Lin
      Pages 342-361
    5. An Improved Method to Unveil Malware’s Hidden Behavior

      • Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang
      Pages 362-382
    6. BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces

      • Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang
      Pages 383-403
    7. Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling

      • Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma et al.
      Pages 404-426
    8. Meet in the Middle Attack on Type-1 Feistel Construction

      • Yuanhao Deng, Chenhui Jin, Rongjia Li
      Pages 427-444
  3. Applications

    1. Front Matter

      Pages 445-445
    2. Influence of Error on Hamming Weights for ASCA

      • Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz
      Pages 447-460
    3. State-of-the-Art: Security Competition in Talent Education

      • Xiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song
      Pages 461-481
    4. A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures

      • Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu et al.
      Pages 482-499
  4. Back Matter

    Pages 529-530

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.


The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.


Editors and Affiliations

  • Xidian University, Xi’an, China

    Xiaofeng Chen

  • SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

  • Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access