default search action
ICISC 2022, Seoul, South Korea
- Seung-Hyun Seo, Hwajeong Seo:
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13849, Springer 2023, ISBN 978-3-031-29370-2
Cryptanalysis
- Jonghyun Park, Jongsung Kim:
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. 3-16 - Jannis Bossert, Eik List, Stefan Lucks:
Implicit Key-Stretching Security of Encryption Schemes. 17-40 - Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. 41-60 - Li Zhang, Wenling Wu, Yongxia Mao:
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. 61-77
Cyber Security
- Leo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon:
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. 81-99 - Mashari Alatawi, Nitesh Saxena:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. 100-123 - Hoyong Jin, Dohyeon An, Taekyoung Kwon:
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. 124-144
Applied Cryptography
- Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. 147-170 - Mohammad Nabil Ahmed, Kana Shimizu:
Private Evaluation of a Decision Tree Based on Secret Sharing. 171-194 - Mario Larangeira:
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery. 195-215
Fault and Side-Channel Attack
- Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. 219-234 - Jae-Won Huh, Dong-Guk Han:
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. 235-245
Efficient Implementation
- Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin:
A Performance Evaluation of IPsec with Post-Quantum Cryptography. 249-266 - Jianliang Zheng, Jie Li:
An Ultrafast Cryptographically Secure Pseudorandom Number Generator. 267-291 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj:
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. 292-314
Signature Schemes
- Masayuki Tezuka, Keisuke Tanaka:
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. 317-336 - Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. 337-362 - Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Group Testing Aggregate Signatures with Soundness. 363-381 - Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. 382-407 - Shingo Sato, Junji Shikata:
Identity-based Interactive Aggregate Signatures from Lattices. 408-432
Post-quantum Cryptography
- Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka:
Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields. 435-449 - Ruize Wang, Kalle Ngo, Elena Dubrova:
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. 450-471 - Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya:
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler. 472-490 - David Chaum, Mario Larangeira, Mario Yaksetig:
WOTSwana: A Generalized S leeve Construction for Multiple Proofs of Ownership. 491-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.