Login / Signup
ICISC
1998
2008
2013
2023
1998
2023
Keyphrases
Publications
volume 13849, 2023
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers
ICISC
13849 (2023)
2022
Shingo Sato
,
Junji Shikata
,
Tsutomu Matsumoto
Group Testing Aggregate Signatures with Soundness.
ICISC
(2022)
Mila Anastasova
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
,
Lubjana Beshaj
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4.
ICISC
(2022)
Jannis Bossert
,
Eik List
,
Stefan Lucks
Implicit Key-Stretching Security of Encryption Schemes.
ICISC
(2022)
Masayuki Tezuka
,
Keisuke Tanaka
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature.
ICISC
(2022)
Anaëlle Le Dévéhat
,
Shingo Hasegawa
,
Hiroki Shizuya
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler.
ICISC
(2022)
Shiyao Chen
,
Chun Guo
,
Jian Guo
,
Li Liu
,
Meiqin Wang
,
Puwen Wei
,
Zeyu Xu
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures.
ICISC
(2022)
Ichiro Iwata
,
Yusuke Yoshida
,
Keisuke Tanaka
Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields.
ICISC
(2022)
Mashari Alatawi
,
Nitesh Saxena
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems.
ICISC
(2022)
Mohammad Nabil Ahmed
,
Kana Shimizu
Private Evaluation of a Decision Tree Based on Secret Sharing.
ICISC
(2022)
Leo Hyun Park
,
Eunbi Hwang
,
Donggun Lee
,
Taekyoung Kwon
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception.
ICISC
(2022)
Ruize Wang
,
Kalle Ngo
,
Elena Dubrova
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
ICISC
(2022)
Masahito Ishizaka
,
Kazuhide Fukushima
Attribute-Based Signatures for Range of Inner Product and Its Applications.
ICISC
(2022)
Boly Seck
,
Pierre-Louis Cayrel
,
Idy Diop
,
Vlad-Florin Dragoi
,
Kalen Couzon
,
Brice Colombier
,
Vincent Grosso
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems.
ICISC
(2022)
Jae-Won Huh
,
Dong-Guk Han
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts.
ICISC
(2022)
Li Zhang
,
Wenling Wu
,
Yongxia Mao
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore.
ICISC
(2022)
Shingo Sato
,
Junji Shikata
Identity-based Interactive Aggregate Signatures from Lattices.
ICISC
(2022)
Seungyeon Bae
,
Yousung Chang
,
Hyeongjin Park
,
Minseo Kim
,
Youngjoo Shin
A Performance Evaluation of IPsec with Post-Quantum Cryptography.
ICISC
(2022)
Zi-Yuan Liu
,
Chu-Chieh Chien
,
Yi-Fan Tseng
,
Raylin Tso
,
Masahiro Mambo
Public Key Encryption with Hierarchical Authorized Keyword Search.
ICISC
(2022)
Mario Larangeira
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery.
ICISC
(2022)
Masahito Ishizaka
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
ICISC
(2022)
Hoyong Jin
,
Dohyeon An
,
Taekyoung Kwon
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing.
ICISC
(2022)
Jonghyun Park
,
Jongsung Kim
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT.
ICISC
(2022)
Jianliang Zheng
,
Jie Li
An Ultrafast Cryptographically Secure Pseudorandom Number Generator.
ICISC
(2022)
David Chaum
,
Mario Larangeira
,
Mario Yaksetig
Construction for Multiple Proofs of Ownership.
ICISC
(2022)
volume 13218, 2022
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers
ICISC
13218 (2022)
2021
Ravi Anand
,
Takanori Isobe
Differential Fault Attack on Rocca.
ICISC
(2021)
Chanho Jeon
,
Donghoe Heo
,
MyeongHoon Lee
,
Sunyeop Kim
,
Seokhie Hong
Efficient Quantum Circuit of Proth Number Modular Multiplication.
ICISC
(2021)
Kazuki Yamamura
,
Yuntao Wang
,
Eiichiro Fujisaki
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods.
ICISC
(2021)
Congming Wei
,
Chenhao Wu
,
Ximing Fu
,
Xiaoyang Dong
,
Kai He
,
Jue Hong
,
Xiaoyun Wang
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems.
ICISC
(2021)
Yongseong Lee
,
Jinkeon Kang
,
Donghoon Chang
,
Seokhie Hong
A Preimage Attack on Reduced Gimli-Hash.
ICISC
(2021)
Seonghyuck Lim
,
Jaeseung Han
,
Taeho Lee
,
Dong-Guk Han
Differential Fault Attack on Lightweight Block Cipher PIPO.
ICISC
(2021)
Yuki Okano
,
Junichi Tomida
,
Akira Nagai
,
Kazuki Yoneyama
,
Atsushi Fujioka
,
Koutarou Suzuki
Revocable Hierarchical Identity-Based Authenticated Key Exchange.
ICISC
(2021)
Gwangbae Choi
,
Serge Vaudenay
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem.
ICISC
(2021)
Snehil Joshi
,
Durgesh Pandey
,
Kannan Srinathan
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability.
ICISC
(2021)
Ji-Eun Woo
,
Jaeseung Han
,
Yeon-Jae Kim
,
Hye-Won Mun
,
Seonghyuck Lim
,
Tae-Ho Lee
,
Seong-Hyun An
,
Soo-Jin Kim
,
Dong-Guk Han
Learning-based Side-Channel Analysis on PIPO.
ICISC
(2021)
Pourandokht Behrouz
,
Panagiotis Grontas
,
Vangelis Konstantakatos
,
Aris Pagourtzis
,
Marianna Spyrakou
Designated-Verifier Linkable Ring Signatures.
ICISC
(2021)
Hyunjun Kim
,
Kyungbae Jang
,
Gyeongju Song
,
Minjoo Sim
,
Siwoo Eum
,
Hyunji Kim
,
Hyeokdong Kwon
,
Wai-Kong Lee
,
Hwajeong Seo
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3.
ICISC
(2021)
Jongheon Lee
,
Sokjoon Lee
,
You-Seok Lee
,
Dooho Choi
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction.
ICISC
(2021)
Shoichi Hirose
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function.
ICISC
(2021)
Oliver Braunsdorf
,
Stefan Sessinghaus
,
Julian Horsch
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis.
ICISC
(2021)
Lin Ding
,
Zheng Wu
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems.
ICISC
(2021)
Gyeongju Song
,
Kyungbae Jang
,
Hyunji Kim
,
Wai-Kong Lee
,
Zhi Hu
,
Hwajeong Seo
Grover on SM3.
ICISC
(2021)
Jonghyun Park
,
Hangi Kim
,
Jongsung Kim
Improved See-In-The-Middle Attacks on AES.
ICISC
(2021)
Peixin Ren
,
Xiaozhuo Gu
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice.
ICISC
(2021)
Matthew Beighton
,
Harry Bartlett
,
Leonie Simpson
,
Kenneth Koon-Ho Wong
Algebraic Attacks on Grain-Like Keystream Generators.
ICISC
(2021)
Robi Pedersen
,
Osmanbey Uzunkol
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications.
ICISC
(2021)
Valeh Farzaliyev
,
Jan Willemson
,
Jaan Kristjan Kaasik
Improved Lattice-Based Mix-Nets for Electronic Voting.
ICISC
(2021)
Hiroki Yamamuro
,
Keisuke Hara
,
Masayuki Tezuka
,
Yusuke Yoshida
,
Keisuke Tanaka
Forward Secure Message Franking.
ICISC
(2021)
volume 12593, 2021
Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings
ICISC
12593 (2021)