Skip to main content
  • Conference proceedings
  • © 2017

Information Security

20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10599)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages I-XIII
  2. Symmetric Cryptography

    1. Front Matter

      Pages 1-1
    2. Rate-One AE with Security Under RUP

      • Shoichi Hirose, Yu Sasaki, Kan Yasuda
      Pages 3-20
    3. Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares

      • Daniel Dinu, Johann Großschädl, Yann Le Corre
      Pages 39-57
  3. Post-quantum Cryptography

    1. Front Matter

      Pages 77-77
    2. Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU

      • Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
      Pages 79-91
    3. Zero-Knowledge Password Policy Check from Lattices

      • Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
      Pages 92-113
    4. Generic Forward-Secure Key Agreement Without Signatures

      • Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
      Pages 114-133
  4. Public-Key Cryptography

    1. Front Matter

      Pages 135-135
    2. A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption

      • Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
      Pages 137-154
    3. Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms

      • Jérémy Chotard, Duong Hieu Phan, David Pointcheval
      Pages 155-172
    4. Watermarking Public-Key Cryptographic Functionalities and Implementations

      • Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
      Pages 173-191
  5. Authentication

    1. Front Matter

      Pages 193-193
    2. Contactless Access Control Based on Distance Bounding

      • Handan Kılınç, Serge Vaudenay
      Pages 195-213
  6. Attacks

    1. Front Matter

      Pages 231-231
    2. Low-Level Attacks in Bitcoin Wallets

      • Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias
      Pages 233-253
    3. Improving Password Guessing Using Byte Pair Encoding

      • Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo
      Pages 254-268

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. 

The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Editors and Affiliations

  • Inria, Tokyo, Japan

    Phong Q. Nguyen

  • Singapore University of Technology and Design, Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access