TY - BOOK AU - Chen,Xiaofeng AU - Lin,Dongdai AU - Yung,Moti ED - Inscrypt (Conference) TI - Information security and cryptology: 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, revised selected papers T2 - Lecture Notes in Computer Science, SN - 9783319751603 AV - QA76.9.A25 U1 - 005.8 23 PY - 2018/// CY - Cham, Switzerland PB - Springer KW - Computer security KW - Congresses KW - Data encryption (Computer science) KW - Computers KW - Security KW - General KW - bisacsh KW - Information Theory KW - Social Aspects KW - Law KW - Science & Technology KW - Database Management KW - Data Mining KW - Coding theory & cryptology KW - bicssc KW - Ethical & social aspects of IT KW - Legal aspects of IT KW - Data mining KW - fast KW - Computers and civilization KW - Computer science KW - Coding theory KW - Electronic books KW - Conference papers and proceedings N1 - Includes bibliographical references at chapter ends, and author index; Keynote speeches; Security and privacy in the IoT; Elisa Bertino --; On crossroads of privacy protection; Mirosław Kutyłowski --; The dual role of smartphones in IoT security; Kui Ren --; Cryptographic protocols and algorithms; Implementing indistinguishability obfuscation using GGH15; Zheng Zhang, Fangguo Zhang, and Huang Zhang --; From attack on Feige-Shamir to construction of oblivious transfer; Jingyue Yu, Yi Deng, and Yu Chen --; A new lattice sieving algorithm base on angular locality-sensitive hashing; Ping Wang and Dongdong Shang --; A simpler Bitcoin voting protocol; Haibo Tian, Liqing Fu, and Jiejie He --; Post-quantum secure remote password protocol from RLWE problem; Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li --; Hashing into twisted Jacobi intersection curves; Xiaoyang He, Wei Yu, and Kunpeng Wang --; Digital signatures; Identity-based key-insulated aggregate signatures, revisited; Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide --; A new constant-size accountable ring signature scheme without random oracles; Sudhakar Kumawat and Souradyuti Paul --; A universal designated multi-verifier transitive signature scheme; Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng --; Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme; Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng --; Encryption; Parallel long messages encryption scheme based on certificateless cryptosystem for big data; Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu --; Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes); Geng Wang, Xiao Zhang, and Yanmei Li --; Fully homomorphic encryption scheme based on public key compression and batch processing; Liquan Chen, Ming Lim, and Muyang Wang --; Leveled FHE with matrix message space; Biao Wang, Xueqing Wang, and Rui Xue --; Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext; Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu; Cryptanalysis and attack; NativeSpeaker : identifying crypto misuses in Android native code libraries; Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu --; A game-based framework towards cyber-attacks on state estimation in ICSs; Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou --; Cryptanalysis of Acorn in nonce-reuse setting; Xiaojuan Zhang and Dongdai Lin --; An improved method to unveil malware's hidden behavior; Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang --; BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces; Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang --; Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling; Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei --; Meet in the middle attack on type-1 Feistel construction; Yuanhao Deng, Chenhui Jin, and Rongjia Li --; Applications; Influence of error on Hamming weights for ASCA; Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz --; State-of-the-art : security competition in talent education; Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song --; A modified fuzzy fingerprint vault based on pair-polar minutiae structures; Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan --; NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment; Chonghua Wang, Zhiyu Hao, and Xiaochun Yun --; A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes; Shanding Xu, Xiwang Cao, and Chunming Tang N2 - This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications UR - https://link-springer-com.libraryproxy.ist.ac.at/book/10.1007/978-3-319-75160-3 ER -