Skip to main content
  • Conference proceedings
  • © 2019

Information Security and Cryptology – ICISC 2018

21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11396)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

    Pages I-XV
  2. Invited Talk

    1. Front Matter

      Pages 1-1
  3. Public-Key Encryption and Implementation

    1. Front Matter

      Pages 21-21
    2. Mitigating the One-Use Restriction in Attribute-Based Encryption

      • Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan
      Pages 23-36
    3. Attacking Noisy Secret CRT-RSA Exponents in Binary Method

      • Kento Oonishi, Noboru Kunihiro
      Pages 37-54
    4. Compact Implementation of Modular Multiplication for Special Modulus on MSP430X

      • Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Zhi Hu
      Pages 55-66
  4. Homomorphic Encryption

    1. Front Matter

      Pages 67-67
    2. Excalibur Key-Generation Protocols for DAG Hierarchic Decryption

      • Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial-Prado
      Pages 103-120
  5. Secure Multiparty Computation

    1. Front Matter

      Pages 121-121
    2. The Six-Card Trick: Secure Computation of Three-Input Equality

      • Kazumasa Shinagawa, Takaaki Mizuki
      Pages 123-131
    3. Unconditionally Secure Distributed Oblivious Polynomial Evaluation

      • Louis Cianciullo, Hossein Ghodosi
      Pages 132-142
    4. An Efficient Private Evaluation of a Decision Graph

      • Hiroki Sudo, Koji Nuida, Kana Shimizu
      Pages 143-160
  6. Post-Quantum Cryptography

    1. Front Matter

      Pages 161-161
    2. Key Reuse Attack on NewHope Key Exchange Protocol

      • Chao Liu, Zhongxiang Zheng, Guangnan Zou
      Pages 163-176
    3. Supersingular Isogeny Diffie–Hellman Authenticated Key Exchange

      • Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
      Pages 177-195
    4. On the Complexity of the LWR-Solving BKW Algorithm

      • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
      Pages 196-214
  7. Secret Sharing and Searchable Encryption

    1. Front Matter

      Pages 215-215

Other Volumes

  1. Information Security and Cryptology – ICISC 2018

About this book

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018.

The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Editors and Affiliations

  • Sejong University, Seoul, Korea (Republic of)

    Kwangsu Lee

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access