default search action
13. ICISC 2010: Seoul, Korea
- Kyung Hyune Rhee, DaeHun Nyang:
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6829, Springer 2011, ISBN 978-3-642-24208-3
Cryptanalysis
- Alexandre Venelli:
Analysis of Nonparametric Estimation Methods for Mutual Information Analysis. 1-15 - Yi Lu, Yvo Desmedt:
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher. 16-28 - Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Known and Chosen Key Differential Distinguishers for Block Ciphers. 29-48 - Bonwook Koo, Deukjo Hong, Daesung Kwon:
Related-Key Attack on the Full HIGHT. 49-67 - Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. 68-91 - Mohammad Reza Sohizadeh Abyaneh:
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems. 92-103 - Xianmeng Meng:
Cryptanalysis of RSA with Small Prime Combination. 104-112
Cryptographic Algorithms
- Yu Chen, Liqun Chen:
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. 113-132 - Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, Olivier Pereira:
Group Signatures are Suitable for Constrained Devices. 133-150 - Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW. 151-168
Implementation
- Haihua Gu, Dawu Gu, WenLu Xie:
Efficient Pairing Computation on Elliptic Curves in Hessian Form. 169-176 - Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl:
FPGA Implementation of an Improved Attack against the DECT Standard Cipher. 177-188 - Timo Kasper, Ingo von Maurich, David F. Oswald, Christof Paar:
Chameleon: A Versatile Emulator for Contactless Smartcards. 189-206
Network and Mobile Security
- Zhi Wang, Renquan Cheng, Debin Gao:
Revisiting Address Space Randomization. 207-221 - Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Evaluation of a Spyware Detection System Using Thin Client Computing. 222-232 - Ambarish Karole, Nitesh Saxena, Nicolas Christin:
A Comparative Usability Evaluation of Traditional Password Managers. 233-251 - Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis:
An Adversarial Evaluation of Network Signaling and Control Mechanisms. 252-265 - Soe Yu Maw:
Secure Personalized Recommendation System for Mobile User. 266-277
Symmetric Key Cryptography
- Mohamed Karroumi:
Protecting White-Box AES with Dual Ciphers. 278-291 - Basel Alomair, Radha Poovendran:
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. 292-310 - Qichun Wang, Thomas Johansson:
On Equivalence Classes of Boolean Functions. 311-324
Cryptographic Protocols
- Takeshi Koshiba, Shinya Sawada:
Public Discussion Must Be Back and Forth in Secure Message Transmission. 325-337 - Christian L. F. Corniaux, Hossein Ghodosi:
Scalar Product-Based Distributed Oblivious Transfer. 338-354 - Zhifang Zhang, Mulan Liu:
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks. 355-369 - Lingling Xu, Fangguo Zhang:
Oblivious Transfer with Complex Attribute-Based Access Control. 370-395
Side Channel Attack
- Jörn-Marc Schmidt, Marcel Medwed:
Fault Attacks on the Montgomery Powering Ladder. 396-406 - Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament:
First Principal Components Analysis: A New Side Channel Distinguisher. 407-419 - Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama:
Fault Analysis on Stream Cipher MUGI. 420-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.