Information Security and Cryptology – ICISC 2019

22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers

  • Jae Hong Seo
Conference proceedings ICISC 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11975)

Also part of the Security and Cryptology book sub series (LNSC, volume 11975)

Table of contents

  1. Front Matter
    Pages i-x
  2. Dongyoung Roh, Bonwook Koo, Younghoon Jung, Il Woong Jeong, Dong-Geon Lee, Daesung Kwon et al.
    Pages 1-19
  3. Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
    Pages 20-51
  4. Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
    Pages 52-69
  5. Hwajeong Seo, Zhe Liu
    Pages 70-83
  6. Hayato Fujii, Félix Carvalho Rodrigues, Julio López
    Pages 84-101
  7. Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu, Hwajeong Seo
    Pages 102-114
  8. Georgia Tsaloli, Aikaterini Mitrokotsa
    Pages 115-132
  9. Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
    Pages 133-149
  10. Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz
    Pages 150-164
  11. Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti
    Pages 194-207
  12. Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
    Pages 208-224
  13. Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee
    Pages 225-241
  14. Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
    Pages 242-259
  15. Jaeheon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim
    Pages 260-277
  16. Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro
    Pages 278-296
  17. Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
    Pages 297-315
  18. Back Matter
    Pages 317-317

About these proceedings


This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019.

The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.


artificial intelligence authentication authentication cryptography data mining data privacy electronic document identification systems encryption encryption privacy preserving public key cryptography security protocols software engineering computer security data security computer networks engineering mathematics signal processing computer hardware

Editors and affiliations

  • Jae Hong Seo
    • 1
  1. 1.Hanyang UniversitySeoulKorea (Republic of)

Bibliographic information

  • DOI
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-40920-3
  • Online ISBN 978-3-030-40921-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site