Information Security

20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

  • Phong Q. Nguyen
  • Jianying Zhou

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10599)

Also part of the Security and Cryptology book sub series (LNSC, volume 10599)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Symmetric Cryptography

    1. Front Matter
      Pages 1-1
    2. Shoichi Hirose, Yu Sasaki, Kan Yasuda
      Pages 3-20
    3. Daniel Dinu, Johann Großschädl, Yann Le Corre
      Pages 39-57
  3. Post-quantum Cryptography

    1. Front Matter
      Pages 77-77
    2. Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
      Pages 79-91
    3. Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
      Pages 92-113
    4. Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
      Pages 114-133
  4. Public-Key Cryptography

    1. Front Matter
      Pages 135-135
    2. Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
      Pages 137-154
    3. Jérémy Chotard, Duong Hieu Phan, David Pointcheval
      Pages 155-172
    4. Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
      Pages 173-191
  5. Authentication

    1. Front Matter
      Pages 193-193
    2. Handan Kılınç, Serge Vaudenay
      Pages 195-213
  6. Attacks

    1. Front Matter
      Pages 231-231
    2. Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias
      Pages 233-253
    3. Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo
      Pages 254-268

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. 

The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Keywords

artificial intelligence authentication block ciphers case based reasoning computer crime cryptography cryptosystems data privacy data security digital signature electronic document identification systems embedded systems encryption fuzzy control knowledge based systems privacy public key cryptography security systems side channel attack software engineering

Editors and affiliations

  • Phong Q. Nguyen
    • 1
  • Jianying Zhou
    • 2
  1. 1.InriaTokyoJapan
  2. 2.Singapore University of Technology and DesignSingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-69659-1
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-69658-4
  • Online ISBN 978-3-319-69659-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book