


default search action
15. ICISC 2012: Seoul, Korea
- Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon:

Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7839, Springer 2013, ISBN 978-3-642-37681-8
Invited Papers
- Thore Graepel, Kristin E. Lauter, Michael Naehrig:

ML Confidential: Machine Learning on Encrypted Data. 1-21 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi

:
Another Look at Affine-Padding RSA Signatures. 22-32 - Christian Rechberger:

On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. 33-36
Attack and Defense
- Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im

:
Balanced Indexing Method for Efficient Intrusion Detection Systems. 37-48 - Barbara Kordy, Sjouke Mauw

, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. 49-64 - Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout:

DNS Tunneling for Network Penetration. 65-77 - Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu:

MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. 78-91
Software and Web Security
- Jiang Ming, Meng Pan, Debin Gao

:
iBinHunt: Binary Hunting with Inter-procedural Control Flow. 92-109 - Christopher Meyer, Florian Feldmann, Jörg Schwenk:

Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys. 110-125
Cryptanalysis I
- Qingju Wang

, Dawu Gu, Vincent Rijmen
, Ya Liu, Jiazhe Chen
, Andrey Bogdanov
:
Improved Impossible Differential Attacks on Large-Block Rijndael. 126-140 - Zhenqi Li, Bin Zhang, Yuan Yao, Dongdai Lin:

Cube Cryptanalysis of LBlock with Noisy Leakage. 141-155 - Yu Sasaki, Lei Wang:

Comprehensive Study of Integral Analysis on 22-Round LBlock. 156-169 - Jingyuan Zhao, Meiqin Wang, Jiazhe Chen

, Yuliang Zheng
:
New Impossible Differential Attack on SAFER + and SAFER + +. 170-183
Cryptographic Protocol
- Christian L. F. Corniaux

, Hossein Ghodosi:
An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol. 184-201 - Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi:

Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms. 202-216 - Lei Zhang:

Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol. 217-230
Identity-Based Encryption
- Kaitai Liang

, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. 231-246 - Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai:

Ciphertext Policy Multi-dimensional Range Encryption. 247-261
Efficient Implementation
- Duc-Phong Le

, Chik How Tan:
Speeding Up Ate Pairing Computation in Affine Coordinates. 262-277 - Shohreh Sharif Mansouri, Elena Dubrova:

An Improved Hardware Implementation of the Grain-128a Stream Cipher. 278-292 - Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:

Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. 293-308
Cloud Computing Security
- Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius:

Trusted Launch of Virtual Machine Instances in Public IaaS Environments. 309-323 - Michael Velten, Frederic Stumpf:

Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. 324-336
Cryptanalysis II
- Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:

Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. 337-351 - Takuma Koyama

, Yu Sasaki, Noboru Kunihiro
:
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. 352-367 - Mohamed Ahmed Abdelraheem:

Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers. 368-382
Side Channel Analysis
- Yongdae Kim

, Naofumi Homma, Takafumi Aoki, Heebong Choi:
Security Evaluation of Cryptographic Modules against Profiling Attacks. 383-394 - Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:

Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. 395-409
Digital Signature
- Laila El Aimani

, Olivier Sanders:
Efficient Group Signatures in the Standard Model. 410-424 - Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi:

Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. 425-440 - Albrecht Petzoldt, Stanislav Bulygin:

Linear Recurring Sequences for the UOV Key Generation Revisited. 441-455 - Sanjit Chatterjee, Chethan Kamath

, Vikas Kumar:
Galindo-Garcia Identity-Based Signature Revisited. 456-471
Privacy Enhancement
- Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim

:
Private Over-Threshold Aggregation Protocols. 472-486 - (Withdrawn) An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. 487-494

- Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard.

- Nasima Begum

, Toru Nakanishi, Nobuo Funabiki:
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. 495-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














