|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 441 occurrences of 289 keywords
|
|
|
Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Seung-Hyun Seo, Hwajeong Seo (eds.) |
Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers |
ICISC |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jannis Bossert, Eik List, Stefan Lucks |
Implicit Key-Stretching Security of Encryption Schemes. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Li Zhang 0108, Wenling Wu, Yongxia Mao |
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ruize Wang, Kalle Ngo, Elena Dubrova |
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Sato, Junji Shikata, Tsutomu Matsumoto |
Group Testing Aggregate Signatures with Soundness. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jae-Won Huh, Dong-Guk Han |
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Sato, Junji Shikata |
Identity-based Interactive Aggregate Signatures from Lattices. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin |
A Performance Evaluation of IPsec with Post-Quantum Cryptography. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Hoyong Jin, Dohyeon An, Taekyoung Kwon 0002 |
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | David Chaum, Mario Larangeira, Mario Yaksetig |
WOTSwana: A Generalized S leeve Construction for Multiple Proofs of Ownership. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo |
Public Key Encryption with Hierarchical Authorized Keyword Search. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Nabil Ahmed, Kana Shimizu |
Private Evaluation of a Decision Tree Based on Secret Sharing. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jonghyun Park, Jongsung Kim |
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mashari Alatawi, Nitesh Saxena |
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Leo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon 0002 |
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya |
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu |
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masahito Ishizaka, Kazuhide Fukushima |
Attribute-Based Signatures for Range of Inner Product and Its Applications. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto |
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj |
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jong Hwan Park, Seung-Hyun Seo (eds.) |
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Tezuka, Keisuke Tanaka |
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka |
Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Mario Larangeira |
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Jianliang Zheng, Jie Li 0005 |
An Ultrafast Cryptographically Secure Pseudorandom Number Generator. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso |
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. |
ICISC |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han |
Learning-based Side-Channel Analysis on PIPO. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose |
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lin Ding 0001, Zheng Wu |
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki |
Revocable Hierarchical Identity-Based Authenticated Key Exchange. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong |
A Preimage Attack on Reduced Gimli-Hash. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang 0001 |
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Anand, Takanori Isobe 0001 |
Differential Fault Attack on Rocca. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong |
Efficient Quantum Circuit of Proth Number Modular Multiplication. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yamamura, Yuntao Wang 0002, Eiichiro Fujisaki |
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han |
Differential Fault Attack on Lightweight Block Cipher PIPO. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Braunsdorf, Stefan Sessinghaus, Julian Horsch |
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka |
Forward Secure Message Franking. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong |
Algebraic Attacks on Grain-Like Keystream Generators. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Robi Pedersen, Osmanbey Uzunkol |
Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Deukjo Hong (eds.) |
Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Peixin Ren, Xiaozhuo Gu |
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo |
Grover on SM3. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jonghyun Park, Hangi Kim, Jongsung Kim |
Improved See-In-The-Middle Attacks on AES. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik |
Improved Lattice-Based Mix-Nets for Electronic Voting. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou |
Designated-Verifier Linkable Ring Signatures. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Snehil Joshi, Durgesh Pandey, Kannan Srinathan |
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gwangbae Choi, Serge Vaudenay |
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo |
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. |
ICISC |
2021 |
DBLP DOI BibTeX RDF |
|
1 | YoungBeom Kim, Hojin Choi, Seog Chung Seo |
Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor Nodes. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo (eds.) |
Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jan Vacek, Jan Václavek |
Key Mismatch Attack on ThreeBears, Frodo and Round5. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huang Lin |
A Sub-linear Lattice-Based Submatrix Commitment Scheme. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huanyu Wang, Elena Dubrova |
Federated Learning in Side-Channel Analysis. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Bolin Wang, Chan Song, Wenling Wu, Lei Zhang 0186 |
A New Non-random Property of 4.5-Round PRINCE. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka |
Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Jean-Jacques Quisquater |
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hwajeong Seo, Reza Azarderakhsh |
Curve448 on 32-Bit ARM Cortex-M4. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi |
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong |
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyunji Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo |
Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Md. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau |
Differential Fault Based Key Recovery Attacks on TRIAD. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Aline Gouget, Jacques Patarin, Ambre Toulemonde |
(Quantum) Cryptanalysis of Misty Schemes. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka |
Security Definitions on Time-Lock Puzzles. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hyunsu Mun, Soohyun Kim, Youngseok Lee 0002 |
A RDBMS-Based Bitcoin Analysis Method. |
ICISC |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jayashree Dey, Ratna Dutta |
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hwajeong Seo, Zhe Liu 0001 |
All the HIGHT You Need on Cortex-M4. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim 0001, Julian Jang-Jaccard, Masood Niazi Torshiz |
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee |
Efficient Identity-Based Encryption from LWR. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti |
Improvement of Binary and Non Binary Statistical Decoding Algorithm. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek |
Systematic Construction of Nonlinear Product Attacks on Block Ciphers. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Georgia Tsaloli, Aikaterini Mitrokotsa |
Sum It Up: Verifiable Additive Homomorphic Secret Sharing. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt |
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek |
LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Taechan Kim 0001 |
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim |
Faster Bootstrapping of FHE over the Integers. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida |
Authenticated Encryption Based on Lesamnta-LW Hashing Mode. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu 0001, Hwajeong Seo |
FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dongyoung Roh, Bonwook Koo, Younghoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim |
Revised Version of Block Cipher CHAM. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kwangsu Lee (eds.) |
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson |
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro |
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Fujii, Félix Carvalho Rodrigues, Julio César López-Hernández |
Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jae Heon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim |
Complete Addition Law for Montgomery Curves. |
ICISC |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson 0001 |
Recurrent Neural Networks for Fuzz Testing Web Browsers. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kento Oonishi, Noboru Kunihiro |
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Okada 0001, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi |
On the Complexity of the LWR-Solving BKW Algorithm. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Sudo, Koji Nuida, Kana Shimizu |
An Efficient Private Evaluation of a Decision Graph. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Duhyeong Kim, Yongsoo Song |
Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Romar B. dela Cruz, Say Ol |
Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Howon Kim 0001, Dong-Chan Kim (eds.) |
Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Geihs, Johannes Buchmann 0001 |
\mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Meiqi He, Gongxian Zeng, Jun Zhang 0049, Linru Zhang, Yuechen Chen, Siu-Ming Yiu |
A New Privacy-Preserving Searching Model on Blockchain. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xuecheng Ma, Dongdai Lin |
Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Koji Shima, Hiroshi Doi |
A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chao Liu 0060, Zhongxiang Zheng, Guangnan Zou |
Key Reuse Attack on NewHope Key Exchange Protocol. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li |
How to Block the Malicious Access to Android External Storage. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier |
Practical Algebraic Side-Channel Attacks Against ACORN. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado |
Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. |
ICISC |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 678 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|