


default search action
ICISC 2022, Seoul, South Korea
- Seung-Hyun Seo

, Hwajeong Seo:
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13849, Springer 2023, ISBN 978-3-031-29370-2
Cryptanalysis
- Jonghyun Park, Jongsung Kim:

See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. 3-16 - Jannis Bossert, Eik List, Stefan Lucks:

Implicit Key-Stretching Security of Encryption Schemes. 17-40 - Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:

Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. 41-60 - Li Zhang

, Wenling Wu
, Yongxia Mao
:
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. 61-77
Cyber Security
- Leo Hyun Park

, Eunbi Hwang
, Donggun Lee, Taekyoung Kwon
:
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. 81-99 - Mashari Alatawi

, Nitesh Saxena
:
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. 100-123 - Hoyong Jin

, Dohyeon An, Taekyoung Kwon
:
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. 124-144
Applied Cryptography
- Zi-Yuan Liu

, Chu-Chieh Chien, Yi-Fan Tseng
, Raylin Tso
, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. 147-170 - Mohammad Nabil Ahmed

, Kana Shimizu
:
Private Evaluation of a Decision Tree Based on Secret Sharing. 171-194 - Mario Larangeira

:
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery. 195-215
Fault and Side-Channel Attack
- Boly Seck

, Pierre-Louis Cayrel
, Idy Diop
, Vlad-Florin Dragoi
, Kalen Couzon, Brice Colombier
, Vincent Grosso
:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. 219-234 - Jae-Won Huh

, Dong-Guk Han
:
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. 235-245
Efficient Implementation
- Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin:

A Performance Evaluation of IPsec with Post-Quantum Cryptography. 249-266 - Jianliang Zheng, Jie Li:

An Ultrafast Cryptographically Secure Pseudorandom Number Generator. 267-291 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani

, Lubjana Beshaj:
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. 292-314
Signature Schemes
- Masayuki Tezuka

, Keisuke Tanaka:
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. 317-336 - Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:

Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. 337-362 - Shingo Sato, Junji Shikata, Tsutomu Matsumoto:

Group Testing Aggregate Signatures with Soundness. 363-381 - Masahito Ishizaka, Kazuhide Fukushima:

Attribute-Based Signatures for Range of Inner Product and Its Applications. 382-407 - Shingo Sato, Junji Shikata:

Identity-based Interactive Aggregate Signatures from Lattices. 408-432
Post-quantum Cryptography
- Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka:

Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields. 435-449 - Ruize Wang, Kalle Ngo, Elena Dubrova:

A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. 450-471 - Anaëlle Le Dévéhat

, Shingo Hasegawa
, Hiroki Shizuya
:
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler. 472-490 - David Chaum, Mario Larangeira

, Mario Yaksetig:
WOTSwana: A Generalized S leeve Construction for Multiple Proofs of Ownership. 491-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














