


default search action
16. ICISC 2013: Seoul, Korea
- Hyang-Sook Lee, Dong-Guk Han:

Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8565, Springer 2014, ISBN 978-3-319-12159-8
Secure Multiparty Computation
- Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja:

Privacy Assurances in Multiple Data-Aggregation Transactions. 3-19 - Tomas Toft:

A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation. 20-33 - Hervé Chabanne

, Gérard D. Cohen, Alain Patey:
Towards Secure Two-Party Computation from the Wire-Tap Channel. 34-46
Proxy Re-encryption
- Sébastien Canard, Julien Devigne:

Combined Proxy Re-encryption. 49-66 - Kang Yang, Jing Xu, Zhenfeng Zhang:

Certificateless Proxy Re-Encryption Without Pairings. 67-88
Side Channel Analysis and Its Countermeasures
- Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann:

Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes. 91-108 - Yongdae Kim

, Haengseok Ko:
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. 109-120
Cryptanalysis 1
- Xuexin Zheng, Keting Jia:

Impossible Differential Attack on Reduced-Round TWINE. 123-143 - Gildas Avoine, Xavier Carpent

:
Optimal Storage for Rainbow Tables. 144-157 - Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma:

First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. 158-172
Cryptanalysis 2
- Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:

Rebound Attacks on Stribog. 175-188 - Yu Sasaki, Lei Wang:

Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. 189-202 - Li Lin, Wenling Wu, Yanfeng Wang, Lei Zhang:

General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. 203-223
Embedded System Security and Its Implementation
- Hua Chen, Limin Fan:

Integral Based Fault Attack on LBlock. 227-240 - Shohreh Sharif Mansouri, Elena Dubrova:

Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks. 241-255 - Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim:

Parallel Implementations of LEA. 256-274
Primitives for Cryptography
- Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee:

Invertible Polynomial Representation for Private Set Operations. 277-292 - Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert:

On the Efficacy of Solving LWE by Reduction to Unique-SVP. 293-310 - Qichun Wang, Chik How Tan, Timothy Foo:

A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function. 311-322
Digital Signature
- Dennis Y. W. Liu

, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. 325-341 - K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:

A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. 342-362 - Toru Nakanishi, Tomoya Nomura, Nobuo Funabiki:

An Anonymous Reputation System with Reputation Secrecy for Manager. 363-378
Security Protocol
- Mohammad Etemad, Alptekin Küpçü

:
Database Outsourcing with Hierarchical Authenticated Data Structures. 381-399 - Shogo Hajime, Yohei Watanabe, Junji Shikata:

Information-Theoretically Secure Entity Authentication in the Multi-user Setting. 400-417 - Jaydeep Howlader, Sanjit Kumar Roy

, Ashis Kumar Mal:
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment. 418-434 - Toru Nakanishi, Nobuo Funabiki:

Revocable Group Signatures with Compact Revocation List Using Accumulators. 435-451
Cyber Security
- Rakesh M. Verma

, Nabil Hossain:
Semantic Feature Selection for Text with Application to Phishing Email Detection. 455-468 - Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang

, Hyukmin Kwon, Huy Kang Kim
:
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. 469-482 - Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert:

Dark Side of the Shader: Mobile GPU-Aided Malware Delivery. 483-495 - Stephen Bono, Jacob Thompson:

Industry-Wide Misunderstandings of HTTPS. 496-513
Public Key Cryptography
- K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:

Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model. 517-535

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














