default search action
22nd ICISC 2019: Seoul, Korea
- Jae Hong Seo:
Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11975, Springer 2020, ISBN 978-3-030-40920-3 - Dongyoung Roh, Bonwook Koo, Younghoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim:
Revised Version of Block Cipher CHAM. 1-19 - Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek:
Systematic Construction of Nonlinear Product Attacks on Block Ciphers. 20-51 - Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Authenticated Encryption Based on Lesamnta-LW Hashing Mode. 52-69 - Hwajeong Seo, Zhe Liu:
All the HIGHT You Need on Cortex-M4. 70-83 - Hayato Fujii, Félix Carvalho Rodrigues, Julio López:
Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension. 84-101 - Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu, Hwajeong Seo:
FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers. 102-114 - Georgia Tsaloli, Aikaterini Mitrokotsa:
Sum It Up: Verifiable Additive Homomorphic Secret Sharing. 115-132 - Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt:
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. 133-149 - Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz:
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. 150-164 - Taechan Kim:
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters. 165-174 - Jayashree Dey, Ratna Dutta:
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code. 175-193 - Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti:
Improvement of Binary and Non Binary Statistical Decoding Algorithm. 194-207 - Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek:
LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR. 208-224 - Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee:
Efficient Identity-Based Encryption from LWR. 225-241 - Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim:
Faster Bootstrapping of FHE over the Integers. 242-259 - Jae Heon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim:
Complete Addition Law for Montgomery Curves. 260-277 - Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro:
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. 278-296 - Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. 297-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.