


default search action
20th ICISC 2017: Seoul, Korea
- Howon Kim, Dong-Chan Kim:

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10779, Springer 2018, ISBN 978-3-319-78555-4
Symmetric Key Encryption
- Bonwook Koo, Dongyoung Roh

, Hyeonjin Kim, Younghoon Jung
, Donggeon Lee, Daesung Kwon:
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. 3-25 - Mohamed Tolba, Amr M. Youssef

:
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. 26-38 - Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim:

Security of Stateful Order-Preserving Encryption. 39-56
Homomorphic Encryption
- Shuaijianni Xu, Yan He, Liang Feng Zhang:

Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption. 59-70 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu

, Olivier Markowitch:
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. 71-92 - Yang Zhang

, Renzhang Liu
, Dongdai Lin:
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. 93-111 - Seiko Arita, Sari Handa:

Subring Homomorphic Encryption. 112-136
Side Channel Analysis and Implementation
- Yoo-Seung Won, Aesun Park, Dong-Guk Han:

Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. 139-154 - Peter Samarin, Kerstin Lemke-Rust:

Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers. 155-174 - Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee

, Howon Kim:
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. 175-188
Broadcast Encryption
- Kamalesh Acharya

, Ratna Dutta:
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles. 191-213 - Joon Sik Kim, Young Kyung Lee, Jieun Eom, Dong Hoon Lee:

Recipient Revocable Broadcast Encryption with Dealership. 214-228
Elliptic Curve
- Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker

, Yasuyuki Nogami
, Satoshi Uehara, Nariyoshi Yamai
, Sylvain Duquesne
:
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. 231-244 - Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji

:
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. 245-263
Signature and Protocol
- Hafsa Assidi

, Edoukou Berenger Ayebie
, El Mamoun Souidi
:
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. 267-283 - Veronika Kuchta, Rajeev Anand Sahu

, Gaurav Sharma, Olivier Markowitch:
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices. 284-309 - Kyung-Ah Shim, Namhun Koo

, Cheol-Min Park:
Security Analysis of Improved Cubic UOV Signature Schemes. 310-324
Network and System Security
- Weizhi Meng

, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. 327-338 - Mamoru Mimura

, Hidema Tanaka:
Reading Network Packets as a Natural Language for Intrusion Detection. 339-350 - Hyun Kwon

, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. 351-367

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














