Information Security and Cryptology – ICISC 2017

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

  • Howon Kim
  • Dong-Chan Kim
Conference proceedings ICISC 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10779)

Also part of the Security and Cryptology book sub series (LNSC, volume 10779)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Symmetric Key Encryption

    1. Front Matter
      Pages 1-1
    2. Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon
      Pages 3-25
    3. Mohamed Tolba, Amr M. Youssef
      Pages 26-38
    4. Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim
      Pages 39-56
  3. Homomorphic Encryption

    1. Front Matter
      Pages 57-57
    2. Shuaijianni Xu, Yan He, Liang Feng Zhang
      Pages 59-70
    3. Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch
      Pages 71-92
    4. Seiko Arita, Sari Handa
      Pages 112-136
  4. Side Channel Analysis and Implementation

    1. Front Matter
      Pages 137-137
    2. Yoo-Seung Won, Aesun Park, Dong-Guk Han
      Pages 139-154
    3. Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim
      Pages 175-188
  5. Broadcast Encryption

    1. Front Matter
      Pages 189-189
    2. Joon Sik Kim, Youngkyung Lee, Jieun Eom, Dong Hoon Lee
      Pages 214-228
  6. Elliptic Curve

    1. Front Matter
      Pages 229-229
    2. Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara et al.
      Pages 231-244

About these proceedings

Introduction

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

Keywords

artificial intelligence authentication cryptography data security electronic document identification systems encryption public key cryptography

Editors and affiliations

  • Howon Kim
    • 1
  • Dong-Chan Kim
    • 2
  1. 1.Pusan National UniversityBusanKorea (Republic of)
  2. 2.Kookmin UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-78556-1
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-78555-4
  • Online ISBN 978-3-319-78556-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace