Search Results for information-security-and-cryptology

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.

Author: Fuchun Guo

Publisher: Springer

ISBN: 9783030142346

Category: Computers

Page: 674

View: 584

DOWNLOAD & READ
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.
2019-03-21 By Fuchun Guo

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013.

Author: Hyang-Sook Lee

Publisher: Springer

ISBN: 9783319121604

Category: Computers

Page: 538

View: 672

DOWNLOAD & READ
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.
2014-10-18 By Hyang-Sook Lee

All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”.

Author: Kwangjo Kim

Publisher: Springer

ISBN: 9783540458616

Category: Computers

Page: 460

View: 780

DOWNLOAD & READ
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6–7, 2001. The 63 Building, consisting of 60 stories above the ground and 3 stories underground, stands soaring up into the sky on the island of Youido, the Manhattan of Korea, and ranks by far the tallest of all buildings in the country. The program committee received 102 submissions from 17 countries and regions (Australia, Belgium, China, Denmark, France, Germany, India, Italy, Japan, Korea, The Netherlands, Spain, Taiwan, Thailand, Vietnam, UK, and USA), of which 32 were selected for presentation in 8 sessions. All submissions were anonymously reviewed by at least 3 experts in the relevant areas. There was one invited talk by David Pointcheval (ENS, France) on “Practical Security in Public-Key Cryptography”. We are very grateful to all the program committee members who devoted much e?ort and valuable time to reading and selecting the papers. These p- ceedingscontainthe?nalversionofeachpaperrevisedaftertheconference.Since the revised versions were not checked by the program committee rigorously, the authors must bear full responsibility for the contents of their papers.
2003-07-31 By Kwangjo Kim

This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.

Author: Deukjo Hong

Publisher: Springer

ISBN: 3030688895

Category: Computers

Page: 289

View: 99

DOWNLOAD & READ
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online. The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
2021-02-07 By Deukjo Hong

The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume.

Author: Dengguo Feng

Publisher: Springer

ISBN: 9783540324249

Category: Computers

Page: 428

View: 937

DOWNLOAD & READ
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.
2005-12-02 By Dengguo Feng

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

Author: Moti Yung

Publisher: Springer

ISBN: 9783642014406

Category: Computers

Page: 439

View: 433

DOWNLOAD & READ
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
2009-04-29 By Moti Yung

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.

Author: Seokhie Hong

Publisher: Springer

ISBN: 331953176X

Category: Computers

Page: 351

View: 862

DOWNLOAD & READ
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.
2017-02-09 By Seokhie Hong

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.

Author: Howon Kim

Publisher: Springer

ISBN: 3319785559

Category: Computers

Page: 369

View: 318

DOWNLOAD & READ
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.
2018-03-22 By Howon Kim

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015.

Author: Dongdai Lin

Publisher: Springer

ISBN: 3319388975

Category: Computers

Page: 490

View: 614

DOWNLOAD & READ
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
2016-05-05 By Dongdai Lin

This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006.

Author: Helger Lipmaa

Publisher: Springer

ISBN: 9783540496106

Category: Computers

Page: 308

View: 330

DOWNLOAD & READ
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
2006-11-09 By Helger Lipmaa