|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 441 occurrences of 289 keywords
|
|
|
Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Seung-Hyun Seo, Hwajeong Seo (eds.) |
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-031-29370-2 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jannis Bossert, Eik List, Stefan Lucks |
Implicit Key-Stretching Security of Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 17-40, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Li Zhang 0108, Wenling Wu, Yongxia Mao |
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 61-77, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ruize Wang, Kalle Ngo, Elena Dubrova |
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 450-471, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Sato, Junji Shikata, Tsutomu Matsumoto |
Group Testing Aggregate Signatures with Soundness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 363-381, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jae-Won Huh, Dong-Guk Han |
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 235-245, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Sato, Junji Shikata |
Identity-based Interactive Aggregate Signatures from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 408-432, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin |
A Performance Evaluation of IPsec with Post-Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 249-266, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hoyong Jin, Dohyeon An, Taekyoung Kwon 0002 |
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 124-144, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Mario Larangeira, Mario Yaksetig |
WOTSwana: A Generalized S leeve Construction for Multiple Proofs of Ownership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 491-511, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo |
Public Key Encryption with Hierarchical Authorized Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 147-170, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Nabil Ahmed, Kana Shimizu |
Private Evaluation of a Decision Tree Based on Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 171-194, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jonghyun Park, Jongsung Kim |
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 3-16, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 100-123, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Leo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon 0002 |
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 81-99, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya |
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 472-490, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu |
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 41-60, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masahito Ishizaka, Kazuhide Fukushima |
Attribute-Based Signatures for Range of Inner Product and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 382-407, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto |
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 337-362, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj |
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 292-314, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jong Hwan Park, Seung-Hyun Seo (eds.) |
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-031-08895-7 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Tezuka, Keisuke Tanaka |
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 317-336, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka |
Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 435-449, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mario Larangeira |
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 195-215, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jianliang Zheng, Jie Li 0005 |
An Ultrafast Cryptographically Secure Pseudorandom Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 267-291, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso |
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 219-234, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han |
Learning-based Side-Channel Analysis on PIPO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 308-321, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose |
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 325-338, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lin Ding 0001, Zheng Wu |
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 359-375, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki |
Revocable Hierarchical Identity-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 3-27, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong |
A Preimage Attack on Reduced Gimli-Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 217-237, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang 0001 |
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 195-216, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Anand, Takanori Isobe 0001 |
Differential Fault Attack on Rocca. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 283-295, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong |
Efficient Quantum Circuit of Proth Number Modular Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 403-417, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yamamura, Yuntao Wang 0002, Eiichiro Fujisaki |
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 159-174, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han |
Differential Fault Attack on Lightweight Block Cipher PIPO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 296-307, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Braunsdorf, Stefan Sessinghaus, Julian Horsch |
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 175-191, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka |
Forward Secure Message Franking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 339-358, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong |
Algebraic Attacks on Grain-Like Keystream Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 241-270, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Robi Pedersen, Osmanbey Uzunkol |
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 95-118, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Deukjo Hong (eds.) |
Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-030-68889-9 The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Peixin Ren, Xiaozhuo Gu |
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 137-156, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo |
Grover on SM3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 421-433, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jonghyun Park, Hangi Kim, Jongsung Kim |
Improved See-In-The-Middle Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 271-279, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik |
Improved Lattice-Based Mix-Nets for Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 119-136, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou |
Designated-Verifier Linkable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 51-70, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 379-402, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Snehil Joshi, Durgesh Pandey, Kannan Srinathan |
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 71-91, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gwangbae Choi, Serge Vaudenay |
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 28-47, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo |
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 434-444, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
1 | YoungBeom Kim, Hojin Choi, Seog Chung Seo |
Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 140-154, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo (eds.) |
Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-030-40920-3 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jan Vacek, Jan Václavek |
Key Mismatch Attack on ThreeBears, Frodo and Round5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 182-198, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huang Lin |
A Sub-linear Lattice-Based Submatrix Commitment Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 87-98, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huanyu Wang, Elena Dubrova |
Federated Learning in Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 257-272, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bolin Wang, Chan Song, Wenling Wu, Lei Zhang 0186 |
A New Non-random Property of 4.5-Round PRINCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 199-212, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka |
Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 16-39, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Jean-Jacques Quisquater |
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 157-181, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hwajeong Seo, Reza Azarderakhsh |
Curve448 on 32-Bit ARM Cortex-M4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 125-139, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi |
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 58-84, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong |
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 99-122, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyunji Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo |
Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 215-234, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Md. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau |
Differential Fault Based Key Recovery Attacks on TRIAD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 273-287, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aline Gouget, Jacques Patarin, Ambre Toulemonde |
(Quantum) Cryptanalysis of Misty Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 43-57, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka |
Security Definitions on Time-Lock Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 3-15, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyunsu Mun, Soohyun Kim, Youngseok Lee 0002 |
A RDBMS-Based Bitcoin Analysis Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 235-253, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jayashree Dey, Ratna Dutta |
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 175-193, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hwajeong Seo, Zhe Liu 0001 |
All the HIGHT You Need on Cortex-M4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 70-83, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim 0001, Julian Jang-Jaccard, Masood Niazi Torshiz |
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 150-164, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee |
Efficient Identity-Based Encryption from LWR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 225-241, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti |
Improvement of Binary and Non Binary Statistical Decoding Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 194-207, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek |
Systematic Construction of Nonlinear Product Attacks on Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 20-51, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Georgia Tsaloli, Aikaterini Mitrokotsa |
Sum It Up: Verifiable Additive Homomorphic Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 115-132, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt |
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 133-149, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek |
LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 208-224, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Taechan Kim 0001 |
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 165-174, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim |
Faster Bootstrapping of FHE over the Integers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 242-259, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida |
Authenticated Encryption Based on Lesamnta-LW Hashing Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 52-69, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu 0001, Hwajeong Seo |
FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 102-114, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dongyoung Roh, Bonwook Koo, Younghoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim |
Revised Version of Block Cipher CHAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 1-19, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kwangsu Lee (eds.) |
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-030-12145-7 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson |
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 297-315, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro |
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 278-296, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Fujii, Félix Carvalho Rodrigues, Julio César López-Hernández |
Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 84-101, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jae Heon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim |
Complete Addition Law for Montgomery Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, pp. 260-277, 2019, Springer, 978-3-030-40920-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson 0001 |
Recurrent Neural Networks for Fuzz Testing Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 354-370, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kento Oonishi, Noboru Kunihiro |
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 37-54, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Okada 0001, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi |
On the Complexity of the LWR-Solving BKW Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 196-214, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Sudo, Koji Nuida, Kana Shimizu |
An Efficient Private Evaluation of a Decision Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 143-160, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Duhyeong Kim, Yongsoo Song |
Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 85-102, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Romar B. dela Cruz, Say Ol |
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 233-247, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Howon Kim 0001, Dong-Chan Kim (eds.) |
Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![Springer, 978-3-319-78555-4 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Geihs, Johannes Buchmann 0001 |
\mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 269-286, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Meiqi He, Gongxian Zeng, Jun Zhang 0049, Linru Zhang, Yuechen Chen, Siu-Ming Yiu |
A New Privacy-Preserving Searching Model on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 248-266, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xuecheng Ma, Dongdai Lin |
Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 69-84, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Koji Shima, Hiroshi Doi |
A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 217-232, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chao Liu 0060, Zhongxiang Zheng, Guangnan Zou |
Key Reuse Attack on NewHope Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 163-176, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li |
How to Block the Malicious Access to Android External Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 287-303, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier |
Practical Algebraic Side-Channel Attacks Against ACORN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 325-340, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado |
Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 103-120, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 678 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|