Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Gildas Avoine, Xavier Carpent |
Optimal Storage for Rainbow Tables. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Etemad, Alptekin Küpçü |
Database Outsourcing with Hierarchical Authenticated Data Structures. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqian Li, Bao Li 0001, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma |
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert |
Dark Side of the Shader: Mobile GPU-Aided Malware Delivery. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Tomoya Nomura, Nobuo Funabiki |
An Anonymous Reputation System with Reputation Secrecy for Manager. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang 0001 |
Ambiguous One-Move Nominative Signature Without Random Oracles. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yongdae Kim, Haengseok Ko |
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xuexin Zheng, Keting Jia |
Impossible Differential Attack on Reduced-Round TWINE. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Nobuo Funabiki |
Revocable Group Signatures with Compact Revocation List Using Accumulators. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Li Lin 0003, Wenling Wu, Yanfeng Wang, Lei Zhang 0012 |
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Toft |
A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qichun Wang, Chik How Tan, Timothy Foo |
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan |
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann |
Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja |
Privacy Assurances in Multiple Data-Aggregation Transactions. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan |
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Julien Devigne |
Combined Proxy Re-encryption. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert |
On the Efficacy of Solving LWE by Reduction to Unique-SVP. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef |
Rebound Attacks on Stribog. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal |
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shogo Hajime, Yohei Watanabe 0001, Junji Shikata |
Information-Theoretically Secure Entity Authentication in the Multi-user Setting. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031 |
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh M. Verma, Nabil Hossain |
Semantic Feature Selection for Text with Application to Phishing Email Detection. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shohreh Sharif Mansouri, Elena Dubrova |
Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim |
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Bono, Jacob Thompson |
Industry-Wide Misunderstandings of HTTPS. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Chabanne, Gérard D. Cohen, Alain Patey |
Towards Secure Two-Party Computation from the Wire-Tap Channel. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Taekyoung Kwon 0002, Mun-Kyu Lee, Daesung Kwon (eds.) |
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hua Chen 0011, Limin Fan |
Integral Based Fault Attack on LBlock. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kang Yang 0002, Jing Xu 0002, Zhenfeng Zhang |
Certificateless Proxy Re-Encryption Without Pairings. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hwajeong Seo, Zhe Liu 0001, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim 0001 |
Parallel Implementations of LEA. |
ICISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im |
Balanced Indexing Method for Efficient Intrusion Detection Systems. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Howon Kim 0001 (eds.) |
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ayesha Khalid, Deblin Bagchi, Goutam Paul 0001, Anupam Chattopadhyay |
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Kordy, Sjouke Mauw, Patrick Schweitzer |
Quantitative Questions on Attack-Defense Trees. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Meyer, Florian Feldmann, Jörg Schwenk |
Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thore Graepel, Kristin E. Lauter, Michael Naehrig |
ML Confidential: Machine Learning on Encrypted Data. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Duc-Phong Le, Chik How Tan |
Speeding Up Ate Pairing Computation in Affine Coordinates. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian Rechberger |
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqi Li, Bin Zhang 0003, Yuan Yao, Dongdai Lin |
Cube Cryptanalysis of LBlock with Noisy Leakage. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi |
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Velten, Frederic Stumpf |
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qingju Wang 0001, Dawu Gu, Vincent Rijmen, Ya Liu 0001, Jiazhe Chen, Andrey Bogdanov |
Improved Impossible Differential Attacks on Large-Block Rijndael. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Ahmed Abdelraheem |
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Meng Pan, Debin Gao |
iBinHunt: Binary Hunting with Inter-procedural Control Flow. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius |
Trusted Launch of Virtual Machine Instances in Public IaaS Environments. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim |
Private Over-Threshold Aggregation Protocols. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian L. F. Corniaux, Hossein Ghodosi |
An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi |
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031 |
Comprehensive Study of Integral Analysis on 22-Round LBlock. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kohei Kasamatsu, Takahiro Matsuda 0002, Goichiro Hanaoka, Hideki Imai |
Ciphertext Policy Multi-dimensional Range Encryption. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi |
Another Look at Affine-Padding RSA Signatures. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0009 |
Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu |
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Laila El Aimani, Olivier Sanders |
Efficient Group Signatures in the Standard Model. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi |
Security Evaluation of Cryptographic Modules against Profiling Attacks. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Albrecht Petzoldt, Stanislav Bulygin |
Linear Recurring Sequences for the UOV Key Generation Revisited. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daan Raman, Bjorn De Sutter, Bart Coppens 0001, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout |
DNS Tunneling for Network Penetration. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqing Shi, Bin Zhang 0003, Dengguo Feng, Wenling Wu |
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Toshiki Nakasone, Yang Li 0001, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama |
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takuma Koyama, Yu Sasaki, Noboru Kunihiro |
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaitai Liang, Zhen Liu 0008, Xiao Tan 0003, Duncan S. Wong, Chunming Tang 0003 |
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Chethan Kamath, Vikas Kumar |
Galindo-Garcia Identity-Based Signature Revisited. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shohreh Sharif Mansouri, Elena Dubrova |
An Improved Hardware Implementation of the Grain-128a Stream Cipher. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng 0001 |
New Impossible Differential Attack on SAFER + and SAFER + +. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fangming Zhao, Takashi Nishide, Kouichi Sakurai |
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yusong Du, Fangguo Zhang, Meicheng Liu |
On the Resistance of Boolean Functions against Fast Algebraic Attacks. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kai Chen 0012, Yifeng Lian, Yingjun Zhang |
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kyung Chul Jeong, Dong Hoon Lee 0002, Daewan Han |
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Laila El Aimani |
Generic Constructions for Verifiable Signcryption. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Koutarou Suzuki |
Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zou, Wenling Wu, Shuang Wu 0004, Bozhan Su, Le Dong |
Preimage Attacks on Step-Reduced SM3 Hash Function. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Teruya Minamoto, Ryuji Ohura |
A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto |
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Liqun Chen 0002, Zongyang Zhang |
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Choudhury, Arpita Patra |
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Kazumaro Aoki |
Improved Integral Analysis on Tweaked Lesamnta. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thorsten Ernst Schilling, Håvard Raddum |
Analysis of Trivium Using Compressed Right Hand Side Equations. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hailong Zhang 0001, Yongbin Zhou, Dengguo Feng |
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Song Luo, Qingni Shen, Zhong Chen 0001 |
Fully Secure Unidirectional Identity-Based Proxy Re-encryption. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito |
Strong Security Notions for Timed-Release Public-Key Encryption Revisited. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon |
Correcting Errors in Private Keys Obtained from Cold Boot Attacks. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang |
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang, Yusong Du |
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yong Qiao, Yuexiang Yang, Jie He 0002, Bo Liu 0014, Yingzhi Zeng |
Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen |
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Deukjo Hong, Bonwook Koo, Daesung Kwon |
Biclique Attack on the Full HIGHT. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daehyun Strobel, Christof Paar |
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Palmieri 0001, Olivier Pereira |
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhenfei Zhang, Thomas Plantard, Willy Susilo |
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida |
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert |
Weaknesses in Current RSA Signature Schemes. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marko Wolf, Timo Gendrullis |
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Cryptanalysis of Round-Reduced HAS-160. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Kazumasa Omote |
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
Breaking a 3D-Based CAPTCHA Scheme. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|