The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (1)
Publication types (Num. hits)
inproceedings(573) proceedings(21)
Venues (Conferences, Journals, ...)
ICISC(594)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 594 publication records. Showing 594 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kwangsu Lee (eds.) Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson 0001 Recurrent Neural Networks for Fuzz Testing Web Browsers. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kento Oonishi, Noboru Kunihiro Attacking Noisy Secret CRT-RSA Exponents in Binary Method. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi On the Complexity of the LWR-Solving BKW Algorithm. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroki Sudo, Koji Nuida, Kana Shimizu An Efficient Private Evaluation of a Decision Graph. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Duhyeong Kim, Yongsoo Song Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Romar B. dela Cruz, Say Ol Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Howon Kim, Dong-Chan Kim (eds.) Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matthias Geihs, Johannes Buchmann 0001 \mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meiqi He, Gongxian Zeng, Jun Zhang, Linru Zhang, Yuechen Chen, Siu-Ming Yiu A New Privacy-Preserving Searching Model on Blockchain. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuecheng Ma, Dongdai Lin Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Koji Shima, Hiroshi Doi A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chao Liu, Zhongxiang Zheng, Guangnan Zou Key Reuse Attack on NewHope Key Exchange Protocol. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li How to Block the Malicious Access to Android External Storage. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier Practical Algebraic Side-Channel Attacks Against ACORN. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tung Chou, Yohei Maezawa, Atsuko Miyaji A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radhakrishna Bhat, N. R. Sunitha A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Cianciullo, Hossein Ghodosi Unconditionally Secure Distributed Oblivious Polynomial Evaluation. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Zhi Hu Compact Implementation of Modular Multiplication for Special Modulus on MSP430X. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Takeshi Koshiba, Katsuyuki Takashima New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan Mitigating the One-Use Restriction in Attribute-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kazumasa Shinagawa, Takaaki Mizuki The Six-Card Trick: Secure Computation of Three-Input Equality. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kamalesh Acharya, Ratna Dutta Recipient Revocable Broadcast Encryption Schemes Without Random Oracles. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim Security of Stateful Order-Preserving Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yoo-Seung Won, Aesun Park, Dong-Guk Han Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joon Sik Kim, Young Kyung Lee, Jieun Eom, Dong Hoon Lee 0001 Recipient Revocable Broadcast Encryption with Dealership. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma 0006, Olivier Markowitch On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kyung-Ah Shim, Namhun Koo, Cheol-Min Park Security Analysis of Improved Cubic UOV Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyun Kwon, Hyunsoo Yoon, Daeseon Choi Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Samarin, Kerstin Lemke-Rust Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weizhi Meng, Lee Wang Hao, Zhe Liu 0001, Chunhua Su, Yan Li Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Gaurav Sharma 0006, Rajeev Anand Sahu, Olivier Markowitch Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seiko Arita, Sari Handa Subring Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuaijianni Xu, Yan He, Liang Feng Zhang Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Tolba, Amr M. Youssef Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang Zhang 0024, Renzhang Liu, Dongdai Lin Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Hidema Tanaka Reading Network Packets as a Natural Language for Intrusion Detection. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Donggeon Lee, Daesung Kwon CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seokhie Hong, Jong Hwan Park (eds.) Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi Revisiting the Cubic UOV Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumit Kumar Debnath, Ratna Dutta New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne An Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse Multiplication. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kwangsu Lee Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Minqian Wang, Zhenfeng Zhang Expanded Framework for Dual System Encryption and Its Application. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue Lossy Key Encapsulation Mechanism and Its Applications. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue 0001 Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Soonhak Kwon, Aaram Yun (eds.) Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Yao Lu 0002 Improved Results on Cryptanalysis of Prime Power RSA. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusong Du, Baodian Wei On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamalesh Acharya, Ratna Dutta Adaptively Secure Broadcast Encryption with Dealership. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung, Dongyoung Roh Analysis of Error Terms of Signatures Based on Learning with Errors. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shoukat Ali, Murat Cenk A New Algorithm for Residue Multiplication Modulo 2^521-1. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg A Secure Group-Based AKA Protocol for Machine-Type Communications. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paulo Martins 0002, Leonel Sousa Enhancing Data Parallelism of Fully Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin 0003, Debin Gao On the Effectiveness of Code-Reuse-Based Android Application Obfuscation. Search on Bibsonomy ICISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Florian Mendel Higher-Order Cryptanalysis of LowMC. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki Anonymous Authentication Scheme Based on PUF. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ning Wang, Xiaoyun Wang, Keting Jia Improved Impossible Differential Attack on Reduced-Round LBlock. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huiling Zhang, Wenling Wu, Yanfeng Wang Integral Attack Against Bit-Oriented Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maki Yoshida, Satoshi Obana On the (In)Efficiency of Non-Interactive Secure Multiparty Computation. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita, Kouichi Sakurai Attribute-Based Two-Tier Signatures: Definition and Construction. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Koray Karabina Point Decomposition Problem in Binary Elliptic Curves. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Julian Vetter, Matthias Junker-Petschick, Jan C. Nordholz, Michael Peter, Janis Danisevskis Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig A General Framework for Redactable Signatures and New Constructions. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Özgür Dagdelen, Sebastian Gajek, Florian Göpfert Learning with Errors in the Exponent. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tomoyuki Tanigaki, Noboru Kunihiro Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jooyoung Lee, Jongsung Kim (eds.) Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong New Efficient Padding Methods Secure Against Padding Oracle Attacks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Seth Gilbert, Xiao Liu, Haifeng Yu On Differentially Private Online Collaborative Recommendation Systems. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert Let Me Prove It to You: RO PUFs Are Provably Learnable. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Wesolowski, Pascal Junod Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maksim O. Shudrak, Vyacheslav V. Zolotarev Improving Fuzzing Using Software Complexity Metrics. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim Faster ECC over \mathbb F_2^521-1 F 2 521 - 1 (feat. NEON). Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang Stack Layout Randomization with Minimal Rewriting of Android Binaries. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda 0002, Goichiro Hanaoka, Tetsu Iwata On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chien-Ning Chen Memory Address Side-Channel Analysis on Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii How Much Can Complexity of Linear Cryptanalysis Be Reduced? Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Gert Læssøe Mikkelsen, Tue Skeltved On the Security of Distributed Multiprime RSA. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya Bicliques with Minimal Data and Time Complexity for AES. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar Remote IP Protection Using Timing Channels. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yasuyuki Nogami, Hwajeong Seo Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jung-Keun Lee, Bonwook Koo, Dongyoung Roh, Woo-Hwan Kim, Daesung Kwon Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Junko Takahashi, Toshinori Fukunaga Fault Analysis on SIMON Family of Lightweight Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cheonshik Kim, Jinsuk Baek, Paul S. Fisher Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Johann Großschädl, Jongseok Choi, Howon Kim Montgomery Modular Multiplication on ARM-NEON Revisited. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 594 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license