The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tung Chou, Yohei Maezawa, Atsuko Miyaji A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radhakrishna Bhat, N. R. Sunitha A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Cianciullo, Hossein Ghodosi Unconditionally Secure Distributed Oblivious Polynomial Evaluation. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Zhi Hu Compact Implementation of Modular Multiplication for Special Modulus on MSP430X. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Takeshi Koshiba, Katsuyuki Takashima New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan Mitigating the One-Use Restriction in Attribute-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kazumasa Shinagawa, Takaaki Mizuki The Six-Card Trick: Secure Computation of Three-Input Equality. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kamalesh Acharya, Ratna Dutta Recipient Revocable Broadcast Encryption Schemes Without Random Oracles. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim Security of Stateful Order-Preserving Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yoo-Seung Won, Aesun Park, Dong-Guk Han Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joon Sik Kim, Young Kyung Lee, Jieun Eom, Dong Hoon Lee 0001 Recipient Revocable Broadcast Encryption with Dealership. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma 0006, Olivier Markowitch On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kyung-Ah Shim, Namhun Koo, Cheol-Min Park Security Analysis of Improved Cubic UOV Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyun Kwon, Hyunsoo Yoon, Daeseon Choi Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Samarin, Kerstin Lemke-Rust Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weizhi Meng 0001, Lee Wang Hao, Zhe Liu 0001, Chunhua Su, Yan Li 0075 Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Gaurav Sharma 0006, Rajeev Anand Sahu, Olivier Markowitch Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seiko Arita, Sari Handa Subring Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuaijianni Xu, Yan He, Liang Feng Zhang Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Tolba, Amr M. Youssef Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang Zhang 0024, Renzhang Liu, Dongdai Lin Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Hidema Tanaka Reading Network Packets as a Natural Language for Intrusion Detection. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Donggeon Lee, Daesung Kwon CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim 0001 Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seokhie Hong, Jong Hwan Park (eds.) Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi Revisiting the Cubic UOV Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumit Kumar Debnath, Ratna Dutta New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingyi Feng, Hua Chen 0011, Si Gao, Limin Fan, Dengguo Feng Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Al-Amin Khandaker, Hirotaka Ono 0003, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne An Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse Multiplication. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kwangsu Lee Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Minqian Wang, Zhenfeng Zhang Expanded Framework for Dual System Encryption and Its Application. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee 0001, Yongha Son A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yamin Liu, Xianhui Lu, Bao Li 0001, Haiyang Xue Lossy Key Encapsulation Mechanism and Its Applications. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue 0001 Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Soonhak Kwon, Aaram Yun (eds.) Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Yao Lu 0002 Improved Results on Cryptanalysis of Prime Power RSA. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusong Du, Baodian Wei On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamalesh Acharya, Ratna Dutta Adaptively Secure Broadcast Encryption with Dealership. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung, Dongyoung Roh Analysis of Error Terms of Signatures Based on Learning with Errors. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shoukat Ali, Murat Cenk A New Algorithm for Residue Multiplication Modulo 2^521-1. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg A Secure Group-Based AKA Protocol for Machine-Type Communications. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paulo Martins 0002, Leonel Sousa Enhancing Data Parallelism of Fully Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin 0003, Debin Gao On the Effectiveness of Code-Reuse-Based Android Application Obfuscation. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Florian Mendel Higher-Order Cryptanalysis of LowMC. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki Anonymous Authentication Scheme Based on PUF. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ning Wang, Xiaoyun Wang 0001, Keting Jia Improved Impossible Differential Attack on Reduced-Round LBlock. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huiling Zhang, Wenling Wu, Yanfeng Wang Integral Attack Against Bit-Oriented Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maki Yoshida, Satoshi Obana On the (In)Efficiency of Non-Interactive Secure Multiparty Computation. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita, Kouichi Sakurai Attribute-Based Two-Tier Signatures: Definition and Construction. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Koray Karabina Point Decomposition Problem in Binary Elliptic Curves. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig A General Framework for Redactable Signatures and New Constructions. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Özgür Dagdelen, Sebastian Gajek, Florian Göpfert Learning with Errors in the Exponent. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tomoyuki Tanigaki, Noboru Kunihiro Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weiqiong Cao, Jingyi Feng, Hua Chen 0011, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jooyoung Lee, Jongsung Kim (eds.) Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong New Efficient Padding Methods Secure Against Padding Oracle Attacks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Seth Gilbert, Xiao Liu, Haifeng Yu On Differentially Private Online Collaborative Recommendation Systems. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert Let Me Prove It to You: RO PUFs Are Provably Learnable. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Wesolowski, Pascal Junod Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maksim O. Shudrak, Vyacheslav V. Zolotarev Improving Fuzzing Using Software Complexity Metrics. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou 0002, Howon Kim 0001 Faster ECC over F2521-1 (feat. NEON). Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang Stack Layout Randomization with Minimal Rewriting of Android Binaries. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda 0002, Goichiro Hanaoka, Tetsu Iwata On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chien-Ning Chen Memory Address Side-Channel Analysis on Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii How Much Can Complexity of Linear Cryptanalysis Be Reduced? Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Gert Læssøe Mikkelsen, Tue Skeltved On the Security of Distributed Multiprime RSA. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya Bicliques with Minimal Data and Time Complexity for AES. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar Remote IP Protection Using Timing Channels. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Ding, Guizhen Zhu, Yang Yu 0008, Zhongxiang Zheng A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yasuyuki Nogami, Hwajeong Seo Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jung-Keun Lee, Bonwook Koo, Dongyoung Roh, Woo-Hwan Kim, Daesung Kwon Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Junko Takahashi, Toshinori Fukunaga Fault Analysis on SIMON Family of Lightweight Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cheonshik Kim, Jinsuk Baek, Paul S. Fisher Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Johann Großschädl, Jongseok Choi, Howon Kim 0001 Montgomery Modular Multiplication on ARM-NEON Revisited. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vandana Guleria, Ratna Dutta Issuer-Free Adaptive Oblivious Transfer with Access Policy. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Serge Vaudenay Compact and Efficient UC Commitments Under Atomic-Exchanges. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed Saied Emam Mohamed, Johannes Buchmann 0001 Mutant Differential Fault Analysis of Trivium MDFA. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hyang-Sook Lee, Dong-Guk Han (eds.) Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christian L. F. Corniaux, Hossein Ghodosi Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon LSH: A New Fast Secure Hash Function Family. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdelrahaman Aly, Mathieu Van Vyve Securely Solving Classical Network Flow Problems. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sumit Kumar Debnath, Ratna Dutta A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atsushi Takayasu, Noboru Kunihiro General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu A Clustering Approach for Privacy-Preserving in Social Networks. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Su Mon Kywe, Yingjiu Li, Robert H. Deng, Jason I. Hong Detecting Camouflaged Applications on Mobile Application Markets. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenbin Zhang 0003, Chik How Tan Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee Invertible Polynomial Representation for Private Set Operations. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license