


default search action
27th ICISC 2024, Seoul, South Korea
- Jongsung Kim, Jungsoo Park, Wai-Kong Lee:
Information Security and Cryptology - ICISC 2024 - 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers. Lecture Notes in Computer Science 15596, Springer 2025, ISBN 978-981-96-5565-6
Cryptanalysis of Block Ciphers
- Bingqing Li, Ling Sun:
Exploring the Optimal Differential Characteristics of SM4 - Improving Automatic Search by Including Human Insights. 3-17 - Yuxuan Peng, Jinpeng Liu, Ling Sun:
Investigation of the Optimal Linear Characteristics of BAKSHEESH. 18-32
Signature Schemes
- Jiaming Wen
, Willy Susilo
, Yanhua Zhang, Fuchun Guo
, Huanguo Zhang:
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations. 35-55 - Hiroaki Anada
, Masayuki Fukumitsu
, Shingo Hasegawa
:
Tightly Secure Lattice-Based Synchronized Aggregate Signature in Standard Model. 56-70
Applied Cryptography
- Suryakant Prasad, Y. Sreenivasa Rao:
FineDReaM: A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism. 73-95 - Shoichi Hirose
, Kazuhiko Minematsu
:
A Formal Treatment of Envelope Encryption. 96-110 - Jae-yun Kim, Jieun Yun, Jung Hee Cheon, Saerom Park:
Efficient Privacy-Preserving Counting Method with Homomorphic Encryption. 111-137 - Junpei Yamaguchi, Tetsuya Izu, Noboru Kunihiro:
Experimental Analysis of the Optimization-Based Factorization Algorithm. 138-154 - Kai Chen
, Yongqiang Li
, Ya Han
, Mingsheng Wang:
Fast Private Set Intersection from Polynomial Multiplication Triples. 155-180 - Jeewoo Jung, Taekyoung Kwon
:
Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation. 181-205
Quantum Cryptography and Deep Learning Based Analysis
- Rini Wisnu Wardhani
, Dedy Septono Catur Putranto
, Howon Kim
:
RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques. 209-230 - Gyeongju Song, Hwajeong Seo
:
Quantum Circuit for Curve25519 with Fewer Qubits. 231-243 - Dukyoung Kim, Kyoungbae Jang, Hyunji Kim, Yujin Oh, Seyoung Yoon, Hwajeong Seo:
CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography. 244-257
Side-Channel and Automotive Attack
- Joonsup Kim
, Dongjun Park
, GyuSang Kim
, Sujin Park, Daehyeon Bae
, Heeseok Kim
, Seokhie Hong
:
REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis. 261-284 - Johannes von Richthofen, Christoph Krauß
, Johann Altgenug
, Dominik Spychalski
, Wolfgang Hommel
:
Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods. 285-310
Cyber Security
- Shohei Mita, Kazuki Yoneyama:
Simultaneous Multiplication Protocol Based on Packed Linear Secret Sharing and Its Applications. 313-328 - Wei-Jen Liao, Tao Ban
, Shin-Ming Cheng
, Takeshi Takahashi
:
Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs. 329-343 - Markus Dahlmanns
, Jan Pennekamp
, Robin Decker
, Klaus Wehrle
:
LUA-IoT: Let's Usably Authenticate the IoT. 344-378 - Mebae Ushida, Takeshi Miyamae, Takeru Fukuoka, Yoshiyuki Sakamaki, Yoshitomo Sakuma, Kota Miyake, Takuya Sakamoto:
An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. 379-400 - Guangcan Cui
, Lisheng Huang
, Fengjun Zhang
, Zuoyuan Niu, Kai Shi, Yunhai Lan
:
Malicious Node Identification Based on Behavioral Statistical Features and Social Relationships. 401-422 - Suryakant Prasad, Y. Sreenivasa Rao:
LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System. 423-440
AI Security
- Wenwu Xu, Pengyi Wu, Peng Wang, Guoqiao Zhou, Lidong Zhai:
Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities. 443-464 - Harry Chandra Tanuwidjaja
, Tao Ban
, Takeshi Takahashi
, Tsung-Nan Lin
, Boyi Lee, Muhamad Erza Aminanto
:
Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS. 465-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.