Skip to main content
  • Conference proceedings
  • © 2018

Information Security and Cryptology – ICISC 2017

20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10779)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISC: International Conference on Information Security and Cryptology

Conference proceedings info: ICISC 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

    Pages I-XIII
  2. Symmetric Key Encryption

    1. Front Matter

      Pages 1-1
    2. CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices

      • Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon
      Pages 3-25
    3. Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik

      • Mohamed Tolba, Amr M. Youssef
      Pages 26-38
    4. Security of Stateful Order-Preserving Encryption

      • Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim
      Pages 39-56
  3. Homomorphic Encryption

    1. Front Matter

      Pages 57-57
    2. Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption

      • Shuaijianni Xu, Yan He, Liang Feng Zhang
      Pages 59-70
    3. Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings

      • Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch
      Pages 71-92
    4. Subring Homomorphic Encryption

      • Seiko Arita, Sari Handa
      Pages 112-136
  4. Side Channel Analysis and Implementation

    1. Front Matter

      Pages 137-137
    2. Novel Leakage Against Realistic Masking and Shuffling Countermeasures

      • Yoo-Seung Won, Aesun Park, Dong-Guk Han
      Pages 139-154
    3. Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors

      • Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim
      Pages 175-188
  5. Broadcast Encryption

    1. Front Matter

      Pages 189-189
    2. Recipient Revocable Broadcast Encryption with Dealership

      • Joon Sik Kim, Youngkyung Lee, Jieun Eom, Dong Hoon Lee
      Pages 214-228
  6. Elliptic Curve

    1. Front Matter

      Pages 229-229
    2. Solving 114-Bit ECDLP for a Barreto-Naehrig Curve

      • Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara et al.
      Pages 231-244

Other Volumes

  1. Information Security and Cryptology – ICISC 2017

About this book

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. 

Editors and Affiliations

  • Pusan National University, Busan, Korea (Republic of)

    Howon Kim

  • Kookmin University, Seoul, Korea (Republic of)

    Dong-Chan Kim

Bibliographic Information

  • Book Title: Information Security and Cryptology – ICISC 2017

  • Book Subtitle: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers

  • Editors: Howon Kim, Dong-Chan Kim

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-78556-1

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing AG, part of Springer Nature 2018

  • Softcover ISBN: 978-3-319-78555-4Published: 22 March 2018

  • eBook ISBN: 978-3-319-78556-1Published: 21 March 2018

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 369

  • Number of Illustrations: 58 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Artificial Intelligence

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access