default search action
20th ICISC 2017: Seoul, Korea
- Howon Kim, Dong-Chan Kim:
Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10779, Springer 2018, ISBN 978-3-319-78555-4
Symmetric Key Encryption
- Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Donggeon Lee, Daesung Kwon:
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. 3-25 - Mohamed Tolba, Amr M. Youssef:
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik. 26-38 - Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim:
Security of Stateful Order-Preserving Encryption. 39-56
Homomorphic Encryption
- Shuaijianni Xu, Yan He, Liang Feng Zhang:
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption. 59-70 - Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch:
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. 71-92 - Yang Zhang, Renzhang Liu, Dongdai Lin:
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme. 93-111 - Seiko Arita, Sari Handa:
Subring Homomorphic Encryption. 112-136
Side Channel Analysis and Implementation
- Yoo-Seung Won, Aesun Park, Dong-Guk Han:
Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. 139-154 - Peter Samarin, Kerstin Lemke-Rust:
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers. 155-174 - Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim:
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. 175-188
Broadcast Encryption
- Kamalesh Acharya, Ratna Dutta:
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles. 191-213 - Joon Sik Kim, Young Kyung Lee, Jieun Eom, Dong Hoon Lee:
Recipient Revocable Broadcast Encryption with Dealership. 214-228
Elliptic Curve
- Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne:
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. 231-244 - Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji:
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. 245-263
Signature and Protocol
- Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi:
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. 267-283 - Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch:
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices. 284-309 - Kyung-Ah Shim, Namhun Koo, Cheol-Min Park:
Security Analysis of Improved Cubic UOV Signature Schemes. 310-324
Network and System Security
- Weizhi Meng, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. 327-338 - Mamoru Mimura, Hidema Tanaka:
Reading Network Packets as a Natural Language for Intrusion Detection. 339-350 - Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. 351-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.