Seokhie Hong - Böcker
Visar alla böcker från författaren Seokhie Hong. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 10157 - Lecture Notes in Computer Science
Information Security and Cryptology – ICISC 2016
19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
Häftad, Engelska, 2017
552 kr
Skickas inom 10-15 vardagar
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions.
Fast Software Encryption
17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
Häftad, Engelska, 2010
552 kr
Skickas inom 10-15 vardagar
Fast Software Encryption (FSE) 2010,the 17th in a series of workshopson s- metriccryptography,washeldinSeoul,Korea,duringFebruary7-10,2010.Since 2002,theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996),Haifa,Israel(1997),Paris,France(1998),Rome, Italy(1999),NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006), Luxembourg, Luxembourg (2007), Lausanne, Switzerland (2008), and Leuven, Belgium (2009). The FSE workshop concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash fu- tions, and message authentication codes. This year 67 papers were submitted. Each paper was reviewed by at least threereviewers,andpapers(co-)authoredbyProgramCommitteememberswere reviewed by at least ?ve reviewers.From the 67 papers, 21 were accepted for presentationattheworkshop,andtheseproceedingscontaintherevisedversions of the papers. At the end of the review phase, the Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur .. Ozen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop also featured two invited talks, "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Along with the presentation of the papers and the invited talks, the rump session was organized and chaired by Orr Dunkelman.
Information Security and Cryptology - ICISC 2009
12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers
Häftad, Engelska, 2010
552 kr
Skickas inom 10-15 vardagar
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of information security and cryptology. It also served as a place for research information exchange. The conference received 88 submissions from 22 countries, covering all areas of inf- mation security and cryptology. The review and selection processes were carried out in two stages by the Program Committee (PC) comprising 57 prominent - searchers via online meetings. First, at least three PC members blind-reviewed each paper, and papers co-authored by the PC members were reviewed by at least ?ve PC members. Second, individual review reports were revealed to PC members, and detailed interactive discussion on each paper followed. Through this process,thePC?nally selected 25papers from15countries. The acceptance rate was 28. 4%. The authors of selected papers had a few weeks to prepare for their ?nal versions based on the comments received from more than 80 ext- nal reviewers. The conference featured one tutorial and one invited talk. The tutorial was given by Amit Sahai from the University of California and the talk ´ was given by Michel Abdalla from Ecole normale sup´ erieure.