Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2012.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2012,
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37682-5},
  doi          = {10.1007/978-3-642-37682-5},
  isbn         = {978-3-642-37681-8},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Abdelraheem12,
  author       = {Mohamed Ahmed Abdelraheem},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Estimating the Probabilities of Low-Weight Differential and Linear
                  Approximations on PRESENT-Like Ciphers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {368--382},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_26},
  doi          = {10.1007/978-3-642-37682-5\_26},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Abdelraheem12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AimaniS12,
  author       = {Laila El Aimani and
                  Olivier Sanders},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Efficient Group Signatures in the Standard Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_29},
  doi          = {10.1007/978-3-642-37682-5\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AimaniS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BegumNF12,
  author       = {Nasima Begum and
                  Toru Nakanishi and
                  Nobuo Funabiki},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Efficient Proofs for {CNF} Formulas on Attributes in Pairing-Based
                  Anonymous Credential System},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {495--509},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_35},
  doi          = {10.1007/978-3-642-37682-5\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BegumNF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChatterjeeKK12,
  author       = {Sanjit Chatterjee and
                  Chethan Kamath and
                  Vikas Kumar},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Galindo-Garcia Identity-Based Signature Revisited},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {456--471},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_32},
  doi          = {10.1007/978-3-642-37682-5\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChatterjeeKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CorniauxG12,
  author       = {Christian L. F. Corniaux and
                  Hossein Ghodosi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {An Information-Theoretically Secure Threshold Distributed Oblivious
                  Transfer Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {184--201},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_14},
  doi          = {10.1007/978-3-642-37682-5\_14},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CorniauxG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CoronNT12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Another Look at Affine-Padding {RSA} Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {22--32},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_2},
  doi          = {10.1007/978-3-642-37682-5\_2},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CoronNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GraepelLN12,
  author       = {Thore Graepel and
                  Kristin E. Lauter and
                  Michael Naehrig},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {{ML} Confidential: Machine Learning on Encrypted Data},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_1},
  doi          = {10.1007/978-3-642-37682-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GraepelLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HakutaKST12,
  author       = {Keisuke Hakuta and
                  Yosuke Katoh and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Batch Verification Suitable for Efficiently Verifying a Limited Number
                  of Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {425--440},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_30},
  doi          = {10.1007/978-3-642-37682-5\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HakutaKST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HamadaKICT12,
  author       = {Koki Hamada and
                  Ryo Kikuchi and
                  Dai Ikarashi and
                  Koji Chida and
                  Katsumi Takahashi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Practically Efficient Multi-party Sorting Protocols from Comparison
                  Sort Algorithms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {202--216},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_15},
  doi          = {10.1007/978-3-642-37682-5\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HamadaKICT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KangKYI12,
  author       = {Boojoong Kang and
                  Hye Seon Kim and
                  Ji Su Yang and
                  Eul Gyu Im},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Balanced Indexing Method for Efficient Intrusion Detection Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {37--48},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_4},
  doi          = {10.1007/978-3-642-37682-5\_4},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KangKYI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Kasamatsu0HI12,
  author       = {Kohei Kasamatsu and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Ciphertext Policy Multi-dimensional Range Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {247--261},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_18},
  doi          = {10.1007/978-3-642-37682-5\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Kasamatsu0HI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KhalidBPC12,
  author       = {Ayesha Khalid and
                  Deblin Bagchi and
                  Goutam Paul and
                  Anupam Chattopadhyay},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Optimized {GPU} Implementation and Performance Analysis of {HC} Series
                  of Stream Ciphers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_21},
  doi          = {10.1007/978-3-642-37682-5\_21},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KhalidBPC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimHAC12,
  author       = {Yongdae Kim and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Heebong Choi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Security Evaluation of Cryptographic Modules against Profiling Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {383--394},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_27},
  doi          = {10.1007/978-3-642-37682-5\_27},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KimHAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimK12a,
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme
                  Using Smartcard},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_36},
  doi          = {10.1007/978-3-642-37682-5\_36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimK12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimMCK12,
  author       = {Myungsun Kim and
                  Abedelaziz Mohaisen and
                  Jung Hee Cheon and
                  Yongdae Kim},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Private Over-Threshold Aggregation Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {472--486},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_33},
  doi          = {10.1007/978-3-642-37682-5\_33},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KimMCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KordyMS12,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Patrick Schweitzer},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Quantitative Questions on Attack-Defense Trees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_5},
  doi          = {10.1007/978-3-642-37682-5\_5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KordyMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KoyamaSK12,
  author       = {Takuma Koyama and
                  Yu Sasaki and
                  Noboru Kunihiro},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Multi-differential Cryptanalysis on Reduced {DM-PRESENT-80:} Collisions
                  and Other Differential Properties},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_25},
  doi          = {10.1007/978-3-642-37682-5\_25},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KoyamaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeT12,
  author       = {Duc{-}Phong Le and
                  Chik How Tan},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Speeding Up Ate Pairing Computation in Affine Coordinates},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_19},
  doi          = {10.1007/978-3-642-37682-5\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LeT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeiWJZY12,
  author       = {Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Zhongwen Zhang and
                  Xingjie Yu},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {MeadDroid: Detecting Monetary Theft Attacks in Android by {DVM} Monitoring},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {78--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_7},
  doi          = {10.1007/978-3-642-37682-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeiWJZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiZYL12,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Yuan Yao and
                  Dongdai Lin},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Cube Cryptanalysis of LBlock with Noisy Leakage},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_11},
  doi          = {10.1007/978-3-642-37682-5\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiZYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiangLTWT12,
  author       = {Kaitai Liang and
                  Zhen Liu and
                  Xiao Tan and
                  Duncan S. Wong and
                  Chunming Tang},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without
                  Random Oracles},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_17},
  doi          = {10.1007/978-3-642-37682-5\_17},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiangLTWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MansouriD12,
  author       = {Shohreh Sharif Mansouri and
                  Elena Dubrova},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {An Improved Hardware Implementation of the Grain-128a Stream Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_20},
  doi          = {10.1007/978-3-642-37682-5\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MansouriD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MeyerFS12,
  author       = {Christopher Meyer and
                  Florian Feldmann and
                  J{\"{o}}rg Schwenk},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Sometimes It's Better to Be STUCK! {SAML} Transportation Unit for
                  Cryptographic Keys},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_9},
  doi          = {10.1007/978-3-642-37682-5\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MeyerFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MingPG12,
  author       = {Jiang Ming and
                  Meng Pan and
                  Debin Gao},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {iBinHunt: Binary Hunting with Inter-procedural Control Flow},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_8},
  doi          = {10.1007/978-3-642-37682-5\_8},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MingPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12,
  author       = {Toshiki Nakasone and
                  Yang Li and
                  Yu Sasaki and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision
                  Distinguisher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_28},
  doi          = {10.1007/978-3-642-37682-5\_28},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NakasoneLSIOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PaladiGAM12,
  author       = {Nicolae Paladi and
                  Christian Gehrmann and
                  Mudassar Aslam and
                  Fredric Morenius},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Trusted Launch of Virtual Machine Instances in Public IaaS Environments},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_22},
  doi          = {10.1007/978-3-642-37682-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PaladiGAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PetzoldtB12,
  author       = {Albrecht Petzoldt and
                  Stanislav Bulygin},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Linear Recurring Sequences for the {UOV} Key Generation Revisited},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_31},
  doi          = {10.1007/978-3-642-37682-5\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PetzoldtB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/RamanSCVBDB12,
  author       = {Daan Raman and
                  Bjorn De Sutter and
                  Bart Coppens and
                  Stijn Volckaert and
                  Koen De Bosschere and
                  Pieter Danhieux and
                  Erik Van Buggenhout},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {{DNS} Tunneling for Network Penetration},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_6},
  doi          = {10.1007/978-3-642-37682-5\_6},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/RamanSCVBDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Rechberger12,
  author       = {Christian Rechberger},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in
                  Symmetric Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {33--36},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_3},
  doi          = {10.1007/978-3-642-37682-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Rechberger12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sasaki012,
  author       = {Yu Sasaki and
                  Lei Wang},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Comprehensive Study of Integral Analysis on 22-Round LBlock},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_12},
  doi          = {10.1007/978-3-642-37682-5\_12},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Sasaki012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Shi0FW12,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng and
                  Wenling Wu},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_24},
  doi          = {10.1007/978-3-642-37682-5\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Shi0FW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/VeltenS12,
  author       = {Michael Velten and
                  Frederic Stumpf},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Secure and Privacy-Aware Multiplexing of Hardware-Protected {TPM}
                  Integrity Measurements among Virtual Machines},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {324--336},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_23},
  doi          = {10.1007/978-3-642-37682-5\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/VeltenS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangGR0CB12,
  author       = {Qingju Wang and
                  Dawu Gu and
                  Vincent Rijmen and
                  Ya Liu and
                  Jiazhe Chen and
                  Andrey Bogdanov},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Improved Impossible Differential Attacks on Large-Block Rijndael},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_10},
  doi          = {10.1007/978-3-642-37682-5\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangGR0CB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Zhang12,
  author       = {Lei Zhang},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Provably Secure Certificateless One-Way and Two-Party Authenticated
                  Key Agreement Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_16},
  doi          = {10.1007/978-3-642-37682-5\_16},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Zhang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhaoWCZ12,
  author       = {Jingyuan Zhao and
                  Meiqin Wang and
                  Jiazhe Chen and
                  Yuliang Zheng},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {New Impossible Differential Attack on {SAFER} + and {SAFER} + +},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_13},
  doi          = {10.1007/978-3-642-37682-5\_13},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhaoWCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimK12,
  title        = {An Enhanced Anonymous Authentication and Key Exchange Scheme Using
                  Smartcard},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {487--494},
  publisher    = {Springer},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_34},
  doi          = {10.1007/978-3-642-37682-5\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics