Login / Signup
ICISC (2)
2024
2024
2024
Keyphrases
Publications
volume 14562, 2024
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II
ICISC (2)
14562 (2024)
2023
Zhenzhen Li
,
Zihan Xue
,
Wei Song
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets.
ICISC (2)
(2023)
Seyeon Jeong
,
Eunbi Hwang
,
Yeongpil Cho
,
Taekyoung Kwon
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing.
ICISC (2)
(2023)
Yuan Ma
,
Weisong Gu
,
Tianyu Chen
,
Na Lv
,
Dongchi Han
,
Shijie Jia
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.
ICISC (2)
(2023)
Takumi Amada
,
Mitsugu Iwamoto
,
Yohei Watanabe
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.
ICISC (2)
(2023)
Shun Uchizono
,
Takeshi Nakai
,
Yohei Watanabe
,
Mitsugu Iwamoto
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
ICISC (2)
(2023)
Min Jang
,
Yuna Hwang
,
Yonghwi Kwon
,
Hyoungshick Kim
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols.
ICISC (2)
(2023)
Kwangjo Kim
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation.
ICISC (2)
(2023)
Tanja Lange
,
Alex Pellegrini
,
Alberto Ravagnani
On the security of REDOG.
ICISC (2)
(2023)
Yeon-Ji Lee
,
Na-Eun Park
,
Il-Gu Lee
Lightweight Anomaly Detection Mechanism Based on Machine Learning Using Low-Cost Surveillance Cameras.
ICISC (2)
(2023)
Tetsuya Nagano
,
Hiroaki Anada
Finsler Encryption.
ICISC (2)
(2023)
Yijian Zhang
,
Yunhao Ling
,
Jie Chen
,
Luping Wang
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding.
ICISC (2)
(2023)
Heekyung Shin
,
Jiwon Ock
,
Hyeon No
,
Seongmin Kim
A Comparative Analysis of Rust-Based SGX Frameworks: Implications for Building SGX Applications.
ICISC (2)
(2023)
Taehyun Ahn
,
Jiwon Kwak
,
Seungjoo Kim
mdTLS: How to Make Middlebox-Aware TLS More Efficient?
ICISC (2)
(2023)
Suhri Kim
,
Eunmin Lee
,
Joohee Lee
,
Minju Lee
,
Hyuna Noh
Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator.
ICISC (2)
(2023)
Tomoki Ono
,
Kazumasa Shinagawa
,
Takeshi Nakai
,
Yohei Watanabe
,
Mitsugu Iwamoto
Single-Shuffle Card-Based Protocols with Six Cards per Gate.
ICISC (2)
(2023)