Information Security and Cryptology -- ICISC 2013

Information Security and Cryptology -- ICISC 2013
Author: Hyang-Sook Lee
Publisher: Springer
Total Pages: 536
Release: 2014-10-18
Genre: Computers
ISBN: 331912160X

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Information Security and Cryptology -- ICISC 2012

Information Security and Cryptology -- ICISC 2012
Author: Taekyoung Kwon
Publisher: Springer
Total Pages: 525
Release: 2013-04-03
Genre: Computers
ISBN: 3642376827

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Information Security and Cryptology – ICISC 2018

Information Security and Cryptology – ICISC 2018
Author: Kwangsu Lee
Publisher: Springer
Total Pages: 375
Release: 2019-01-22
Genre: Computers
ISBN: 3030121461

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Information Security and Cryptology - ICISC 2014

Information Security and Cryptology - ICISC 2014
Author: Jooyoung Lee
Publisher: Springer
Total Pages: 444
Release: 2015-03-16
Genre: Computers
ISBN: 3319159437

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Information Security and Cryptology - ICISC'99

Information Security and Cryptology - ICISC'99
Author: JooSeok Song
Publisher: Springer
Total Pages: 304
Release: 2000-04-12
Genre: Computers
ISBN: 9783540673804

This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation.

Information Security and Cryptology

Information Security and Cryptology
Author: Dongdai Lin
Publisher: Springer
Total Pages: 487
Release: 2016-05-06
Genre: Computers
ISBN: 3319388983

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.

Introduction to Certificateless Cryptography

Introduction to Certificateless Cryptography
Author: Hu Xiong
Publisher: CRC Press
Total Pages: 276
Release: 2016-09-19
Genre: Computers
ISBN: 1315355396

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Codes, Cryptology, and Information Security

Codes, Cryptology, and Information Security
Author: Said El Hajji
Publisher: Springer
Total Pages: 397
Release: 2015-05-06
Genre: Computers
ISBN: 3319186817

This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.