


default search action
17. ICISC 2014: Seoul, Korea
- Jooyoung Lee, Jongsung Kim:

Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8949, Springer 2015, ISBN 978-3-319-15942-3
RSA Security
- Atsushi Takayasu, Noboru Kunihiro

:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. 3-17 - Ivan Damgård, Gert Læssøe Mikkelsen, Tue Skeltved

:
On the Security of Distributed Multiprime RSA. 18-33
Digital Signature
- Kazuki Yoneyama:

Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs. 37-52 - Wenbin Zhang, Chik How Tan:

Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme. 53-66
Public Key Cryptography
- Yasuyuki Nogami, Hwajeong Seo:

Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1. 69-83 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:

Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks. 84-100 - Dan Ding, Guizhen Zhu, Yang Yu

, Zhongxiang Zheng:
A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors. 101-113
Block Ciphers
- Sho Sakikoyama, Yosuke Todo

, Kazumaro Aoki, Masakatu Morii:
How Much Can Complexity of Linear Cryptanalysis Be Reduced? 117-131 - Jung-Keun Lee, Bonwook Koo, Dongyoung Roh

, Woo-Hwan Kim, Daesung Kwon:
Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers. 132-159 - Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya

:
Bicliques with Minimal Data and Time Complexity for AES. 160-174 - Junko Takahashi, Toshinori Fukunaga:

Fault Analysis on SIMON Family of Lightweight Block Ciphers. 175-189
Network Security
- Rong Wang, Min Zhang

, Dengguo Feng, Yanyan Fu:
A Clustering Approach for Privacy-Preserving in Social Networks. 193-204 - Abdelrahaman Aly, Mathieu Van Vyve:

Securely Solving Classical Network Flow Problems. 205-221 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar:

Remote IP Protection Using Timing Channels. 222-237
Mobile Security
- Su Mon Kywe, Yingjiu Li, Robert H. Deng

, Jason I. Hong
:
Detecting Camouflaged Applications on Mobile Application Markets. 241-254 - Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing:

WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. 255-268
Hash Functions
- Jiageng Chen

, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. 271-285 - Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon:

LSH: A New Fast Secure Hash Function Family. 286-313
Information Hiding and Efficiency
- Cheonshik Kim

, Jinsuk Baek, Paul S. Fisher:
Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern. 317-327 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:

Montgomery Modular Multiplication on ARM-NEON Revisited. 328-342 - Sumit Kumar Debnath

, Ratna Dutta:
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function. 343-359
Cryptographic Protocol
- Christian L. F. Corniaux, Hossein Ghodosi:

Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols. 363-380 - Ioana Boureanu, Serge Vaudenay:

Compact and Efficient UC Commitments Under Atomic-Exchanges. 381-401 - Vandana Guleria, Ratna Dutta:

Issuer-Free Adaptive Oblivious Transfer with Access Policy. 402-418
Side-Channel Attacks
- Chien-Ning Chen:

Memory Address Side-Channel Analysis on Exponentiation. 421-432 - Mohamed Saied Emam Mohamed, Johannes Buchmann:

Mutant Differential Fault Analysis of Trivium MDFA. 433-446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














