Cantitate/Preț
Produs

Information Security and Cryptology – ICISC 2016: 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers: Lecture Notes in Computer Science, cartea 10157

Editat de Seokhie Hong, Jong Hwan Park
en Limba Engleză Paperback – 9 feb 2017
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32913 lei

Preț vechi: 41141 lei
-20% Nou

Puncte Express: 494

Preț estimativ în valută:
6298 6626$ 5215£

Carte tipărită la comandă

Livrare economică 14-28 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319531762
ISBN-10: 331953176X
Pagini: 351
Ilustrații: XVI, 351 p. 31 illus.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Protocols.- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.-  Lattice Cryptography.- Practical post-quantum public key cryptosystem based on LWE.- Analysis of Error Terms of Signatures Based on Learning with Errors.- Encryption.- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups.- Lossy Key Encapsulation Mechanism and Its Applications.- Expanded Framework for Dual System Encryption and its Application.- Adaptively Secure Broadcast Encryption with Dealership.- Implementation and Algorithms.- A new algorithm for residue multiplication modulo $2^{521}-1$.- Enhancing Data Parallelism of Fully Homomorphic Encryption.- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication.- Signatures (and Protocol).- Revisiting the Cubic UOV Signature Scheme.- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model.-New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.- Analysis.- Improved Results on Cryptanalysis of Prime Power RSA.- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks.- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.- On the Effectiveness of Code-reuse based Android Application Obfuscation.

Caracteristici

Includes supplementary material: sn.pub/extras