Advertisement

Information Security and Cryptology

13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers

  • Xiaofeng Chen
  • Dongdai Lin
  • Moti Yung
Conference proceedings Inscrypt 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10726)

Also part of the Security and Cryptology book sub series (LNSC, volume 10726)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Keynote Speeches

    1. Front Matter
      Pages 1-1
    2. Elisa Bertino
      Pages 3-10
    3. Mirosław Kutyłowski
      Pages 11-20
  3. Cryptographic Protocols and Algorithms

    1. Front Matter
      Pages 25-25
    2. Zheng Zhang, Fangguo Zhang, Huang Zhang
      Pages 27-43
    3. Haibo Tian, Liqing Fu, Jiejie He
      Pages 81-98
    4. Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
      Pages 99-116
    5. Xiaoyang He, Wei Yu, Kunpeng Wang
      Pages 117-138
  4. Digital Signatures

    1. Front Matter
      Pages 139-139
    2. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide
      Pages 141-156
    3. Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, Ru Meng
      Pages 180-195
    4. Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng
      Pages 196-208
  5. Encryption

  6. Cryptanalysis and Attack

    1. Front Matter
      Pages 299-299
    2. Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li et al.
      Pages 301-320
    3. Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou
      Pages 321-341
    4. Xiaojuan Zhang, Dongdai Lin
      Pages 342-361
    5. Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang
      Pages 362-382
    6. Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang
      Pages 383-403
    7. Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma et al.
      Pages 404-426
    8. Yuanhao Deng, Chenhui Jin, Rongjia Li
      Pages 427-444
  7. Applications

    1. Front Matter
      Pages 445-445
    2. Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz
      Pages 447-460
    3. Xiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song
      Pages 461-481
    4. Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu et al.
      Pages 482-499
  8. Back Matter
    Pages 529-530

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.

The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Keywords

authentication ciphertexts cloud computing computer crime computer systems cryptography data mining data privacy data security electronic document identification systems encryption internet privacy preserving public key cryptography Public keys (PK) random oracle model secret key security systems software engineering user interfaces

Editors and affiliations

  • Xiaofeng Chen
    • 1
  • Dongdai Lin
    • 2
  • Moti Yung
    • 3
  1. 1.Xidian UniversityXi’anChina
  2. 2.SKLOIS, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  3. 3.Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-75160-3
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-75159-7
  • Online ISBN 978-3-319-75160-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site