default search action
16. ICISC 2013: Seoul, Korea
- Hyang-Sook Lee, Dong-Guk Han:
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8565, Springer 2014, ISBN 978-3-319-12159-8
Secure Multiparty Computation
- Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja:
Privacy Assurances in Multiple Data-Aggregation Transactions. 3-19 - Tomas Toft:
A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation. 20-33 - Hervé Chabanne, Gérard D. Cohen, Alain Patey:
Towards Secure Two-Party Computation from the Wire-Tap Channel. 34-46
Proxy Re-encryption
- Sébastien Canard, Julien Devigne:
Combined Proxy Re-encryption. 49-66 - Kang Yang, Jing Xu, Zhenfeng Zhang:
Certificateless Proxy Re-Encryption Without Pairings. 67-88
Side Channel Analysis and Its Countermeasures
- Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:
Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes. 91-108 - Yongdae Kim, Haengseok Ko:
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. 109-120
Cryptanalysis 1
- Xuexin Zheng, Keting Jia:
Impossible Differential Attack on Reduced-Round TWINE. 123-143 - Gildas Avoine, Xavier Carpent:
Optimal Storage for Rainbow Tables. 144-157 - Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma:
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. 158-172
Cryptanalysis 2
- Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:
Rebound Attacks on Stribog. 175-188 - Yu Sasaki, Lei Wang:
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. 189-202 - Li Lin, Wenling Wu, Yanfeng Wang, Lei Zhang:
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. 203-223
Embedded System Security and Its Implementation
- Hua Chen, Limin Fan:
Integral Based Fault Attack on LBlock. 227-240 - Shohreh Sharif Mansouri, Elena Dubrova:
Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks. 241-255 - Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim:
Parallel Implementations of LEA. 256-274
Primitives for Cryptography
- Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee:
Invertible Polynomial Representation for Private Set Operations. 277-292 - Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert:
On the Efficacy of Solving LWE by Reduction to Unique-SVP. 293-310 - Qichun Wang, Chik How Tan, Timothy Foo:
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function. 311-322
Digital Signature
- Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. 325-341 - K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. 342-362 - Toru Nakanishi, Tomoya Nomura, Nobuo Funabiki:
An Anonymous Reputation System with Reputation Secrecy for Manager. 363-378
Security Protocol
- Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. 381-399 - Shogo Hajime, Yohei Watanabe, Junji Shikata:
Information-Theoretically Secure Entity Authentication in the Multi-user Setting. 400-417 - Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal:
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment. 418-434 - Toru Nakanishi, Nobuo Funabiki:
Revocable Group Signatures with Compact Revocation List Using Accumulators. 435-451
Cyber Security
- Rakesh M. Verma, Nabil Hossain:
Semantic Feature Selection for Text with Application to Phishing Email Detection. 455-468 - Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim:
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. 469-482 - Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert:
Dark Side of the Shader: Mobile GPU-Aided Malware Delivery. 483-495 - Stephen Bono, Jacob Thompson:
Industry-Wide Misunderstandings of HTTPS. 496-513
Public Key Cryptography
- K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model. 517-535
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.