Information Security and Cryptology

12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers

  • Kefei Chen
  • Dongdai Lin
  • Moti Yung
Conference proceedings Inscrypt 2016
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10143)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Symmetric Ciphers

    1. Front Matter
      Pages 1-1
    2. Yafei Zheng, Wenling Wu
      Pages 3-17
    3. Shaomei Wang, Tingting Cui, Meiqin Wang
      Pages 18-32
    4. Wentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin
      Pages 33-46
    5. Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li
      Pages 47-63
    6. Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon et al.
      Pages 64-83
    7. Jialin Huang, Hailun Yan, Xuejia Lai
      Pages 84-102
  3. Public-Key Cryptosystems

    1. Front Matter
      Pages 117-117
    2. Shiwei Zhang, Yi Mu, Guomin Yang
      Pages 119-139
    3. Liqiang Peng, Lei Hu, Yao Lu, Hongyun Wei
      Pages 140-149
    4. Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei
      Pages 150-165
  4. Signature and Authentication

    1. Front Matter
      Pages 167-167
    2. Aysajan Abidin
      Pages 169-186
    3. Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu
      Pages 187-204
    4. Wen Gao, Yupu Hu, Baocang Wang, Jia Xie
      Pages 205-218
  5. Homomorphic Encryption

    1. Front Matter
      Pages 219-219
    2. Zengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du
      Pages 221-242
    3. Jingguo Bi, Jiayang Liu, Xiaoyun Wang
      Pages 243-252

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.

The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography;  commitment and protocol; elliptic curves; security and implementation.

Keywords

anonymity authentication cryptanalysis cryptography signature and security protocols block cipher and hash function communication construction cryptographic primitive and application cryptosystems elliptic curves encryption homomorphic encryptions lattice and public key cryptography multyparty and outsource computation post-quantum cryptography privacy public key secret key security

Editors and affiliations

  • Kefei Chen
    • 1
  • Dongdai Lin
    • 2
  • Moti Yung
    • 3
  1. 1.School of ScienceHangzhou Normal UniversityHangzhouChina
  2. 2.Institute of Information EngineeringSKLOISBeijingChina
  3. 3.Snapchat Inc.Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-54705-3
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-54704-6
  • Online ISBN 978-3-319-54705-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349