default search action
15. ICISC 2012: Seoul, Korea
- Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon:
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7839, Springer 2013, ISBN 978-3-642-37681-8
Invited Papers
- Thore Graepel, Kristin E. Lauter, Michael Naehrig:
ML Confidential: Machine Learning on Encrypted Data. 1-21 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at Affine-Padding RSA Signatures. 22-32 - Christian Rechberger:
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. 33-36
Attack and Defense
- Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Balanced Indexing Method for Efficient Intrusion Detection Systems. 37-48 - Barbara Kordy, Sjouke Mauw, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. 49-64 - Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout:
DNS Tunneling for Network Penetration. 65-77 - Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu:
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. 78-91
Software and Web Security
- Jiang Ming, Meng Pan, Debin Gao:
iBinHunt: Binary Hunting with Inter-procedural Control Flow. 92-109 - Christopher Meyer, Florian Feldmann, Jörg Schwenk:
Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys. 110-125
Cryptanalysis I
- Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. 126-140 - Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin:
Cube Cryptanalysis of LBlock with Noisy Leakage. 141-155 - Yu Sasaki, Lei Wang:
Comprehensive Study of Integral Analysis on 22-Round LBlock. 156-169 - Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER + and SAFER + +. 170-183
Cryptographic Protocol
- Christian L. F. Corniaux, Hossein Ghodosi:
An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol. 184-201 - Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi:
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms. 202-216 - Lei Zhang:
Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol. 217-230
Identity-Based Encryption
- Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. 231-246 - Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai:
Ciphertext Policy Multi-dimensional Range Encryption. 247-261
Efficient Implementation
- Duc-Phong Le, Chik How Tan:
Speeding Up Ate Pairing Computation in Affine Coordinates. 262-277 - Shohreh Sharif Mansouri, Elena Dubrova:
An Improved Hardware Implementation of the Grain-128a Stream Cipher. 278-292 - Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. 293-308
Cloud Computing Security
- Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius:
Trusted Launch of Virtual Machine Instances in Public IaaS Environments. 309-323 - Michael Velten, Frederic Stumpf:
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. 324-336
Cryptanalysis II
- Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. 337-351 - Takuma Koyama, Yu Sasaki, Noboru Kunihiro:
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. 352-367 - Mohamed Ahmed Abdelraheem:
Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers. 368-382
Side Channel Analysis
- Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi:
Security Evaluation of Cryptographic Modules against Profiling Attacks. 383-394 - Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. 395-409
Digital Signature
- Laila El Aimani, Olivier Sanders:
Efficient Group Signatures in the Standard Model. 410-424 - Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi:
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. 425-440 - Albrecht Petzoldt, Stanislav Bulygin:
Linear Recurring Sequences for the UOV Key Generation Revisited. 441-455 - Sanjit Chatterjee, Chethan Kamath, Vikas Kumar:
Galindo-Garcia Identity-Based Signature Revisited. 456-471
Privacy Enhancement
- Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols. 472-486 - (Withdrawn) An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. 487-494
- Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard.
- Nasima Begum, Toru Nakanishi, Nobuo Funabiki:
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. 495-509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.