Skip to main content
  • Conference proceedings
  • © 2020

Information Security and Cryptology – ICISC 2019

22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11975)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

    Pages i-x
  2. Revised Version of Block Cipher CHAM

    • Dongyoung Roh, Bonwook Koo, Younghoon Jung, Il Woong Jeong, Dong-Geon Lee, Daesung Kwon et al.
    Pages 1-19
  3. Systematic Construction of Nonlinear Product Attacks on Block Ciphers

    • Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
    Pages 20-51
  4. Authenticated Encryption Based on Lesamnta-LW Hashing Mode

    • Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
    Pages 52-69
  5. All the HIGHT You Need on Cortex–M4

    • Hwajeong Seo, Zhe Liu
    Pages 70-83
  6. Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension

    • Hayato Fujii, Félix Carvalho Rodrigues, Julio López
    Pages 84-101
  7. FACE–LIGHT: Fast AES–CTR Mode Encryption for Low-End Microcontrollers

    • Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu, Hwajeong Seo
    Pages 102-114
  8. Sum It Up: Verifiable Additive Homomorphic Secret Sharing

    • Georgia Tsaloli, Aikaterini Mitrokotsa
    Pages 115-132
  9. There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation

    • Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
    Pages 133-149
  10. An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud

    • Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz
    Pages 150-164
  11. Improvement of Binary and Non Binary Statistical Decoding Algorithm

    • Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti
    Pages 194-207
  12. LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR

    • Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
    Pages 208-224
  13. Efficient Identity-Based Encryption from LWR

    • Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee
    Pages 225-241
  14. Faster Bootstrapping of FHE over the Integers

    • Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
    Pages 242-259
  15. Complete Addition Law for Montgomery Curves

    • Jaeheon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim
    Pages 260-277
  16. Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage

    • Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro
    Pages 278-296
  17. Differential Random Fault Attacks on Certain CAESAR Stream Ciphers

    • Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
    Pages 297-315
  18. Back Matter

    Pages 317-317

Other Volumes

  1. Information Security and Cryptology – ICISC 2019

About this book

This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019.

The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Editors and Affiliations

  • Hanyang University, Seoul, Korea (Republic of)

    Jae Hong Seo

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access