Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10157)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICISC 2016.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.
Similar content being viewed by others
Keywords
- authentication
- block ciphers
- cryptanalysis
- cryptography
- cryptology
- digital signatures
- encryption
- information security
- post quantum cryptography
- privacy preservation
- public key cryptography
- public keys
- random oracle model
- security
- security protocols
- signature schemes
- software engineering
- user privacy
Table of contents (18 papers)
-
Lattice Cryptography
Other volumes
-
Information Security and Cryptology – ICISC 2016
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology – ICISC 2016
Book Subtitle: 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
Editors: Seokhie Hong, Jong Hwan Park
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-53177-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-53176-2Published: 09 February 2017
eBook ISBN: 978-3-319-53177-9Published: 08 February 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVI, 351
Number of Illustrations: 31 b/w illustrations
Topics: Systems and Data Security, Security, Cryptology, Management of Computing and Information Systems