Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9558)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICISC 2015.
Buy print copy
About this book
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015.
The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.
Similar content being viewed by others
Keywords
- cryptographic protocols
- hardware-based security protocols
- hash functionse
- public key (asymmetric) techniques
- symmetric cryptography
- AES
- ciphers
- cryptanalysis
- cryptanalysis and other attacks
- cryptographic primitives
- fingerprint
- formal methods
- hash functions
- malware and its mitigation
- oblivious transfer
- privacy-preserving protocols
- public-key cryptography
- security model
- side-channel
- analysis and countermeasures
Table of contents (23 papers)
-
Public-Key Cryptography
-
Block Cipher Cryptanalysis
-
Elliptic Curve Cryptography
Other volumes
-
Information Security and Cryptology - ICISC 2015
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology - ICISC 2015
Book Subtitle: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers
Editors: Soonhak Kwon, Aaram Yun
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-30840-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2016
Softcover ISBN: 978-3-319-30839-5Published: 10 March 2016
eBook ISBN: 978-3-319-30840-1Published: 09 March 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 374
Number of Illustrations: 62 illustrations in colour
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity