The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Seung-Hyun Seo, Hwajeong Seo (eds.) Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jannis Bossert, Eik List, Stefan Lucks Implicit Key-Stretching Security of Encryption Schemes. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Li Zhang 0108, Wenling Wu, Yongxia Mao Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ruize Wang, Kalle Ngo, Elena Dubrova A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shingo Sato, Junji Shikata, Tsutomu Matsumoto Group Testing Aggregate Signatures with Soundness. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jae-Won Huh, Dong-Guk Han Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shingo Sato, Junji Shikata Identity-based Interactive Aggregate Signatures from Lattices. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Seungyeon Bae, Yousung Chang, Hyeongjin Park, Minseo Kim, Youngjoo Shin A Performance Evaluation of IPsec with Post-Quantum Cryptography. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hoyong Jin, Dohyeon An, Taekyoung Kwon 0002 Differential Testing of Cryptographic Libraries with Hybrid Fuzzing. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1David Chaum, Mario Larangeira, Mario Yaksetig WOTSwana: A Generalized S leeve Construction for Multiple Proofs of Ownership. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo Public Key Encryption with Hierarchical Authorized Keyword Search. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mohammad Nabil Ahmed, Kana Shimizu Private Evaluation of a Decision Tree Based on Secret Sharing. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jonghyun Park, Jongsung Kim See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mashari Alatawi, Nitesh Saxena Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Leo Hyun Park, Eunbi Hwang, Donggun Lee, Taekyoung Kwon 0002 Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Masahito Ishizaka, Kazuhide Fukushima Attribute-Based Signatures for Range of Inner Product and Its Applications. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jong Hwan Park, Seung-Hyun Seo (eds.) Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Masayuki Tezuka, Keisuke Tanaka Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mario Larangeira Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jianliang Zheng, Jie Li 0005 An Ultrafast Cryptographically Secure Pseudorandom Number Generator. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han Learning-based Side-Channel Analysis on PIPO. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lin Ding 0001, Zheng Wu New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yuki Okano, Junichi Tomida, Akira Nagai, Kazuki Yoneyama, Atsushi Fujioka, Koutarou Suzuki Revocable Hierarchical Identity-Based Authenticated Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong A Preimage Attack on Reduced Gimli-Hash. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang 0001 Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ravi Anand, Takanori Isobe 0001 Differential Fault Attack on Rocca. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chanho Jeon, Donghoe Heo, MyeongHoon Lee, Sunyeop Kim, Seokhie Hong Efficient Quantum Circuit of Proth Number Modular Multiplication. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kazuki Yamamura, Yuntao Wang 0002, Eiichiro Fujisaki Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han Differential Fault Attack on Lightweight Block Cipher PIPO. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Oliver Braunsdorf, Stefan Sessinghaus, Julian Horsch Compiler-based Attack Origin Tracking with Dynamic Taint Analysis. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka Forward Secure Message Franking. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong Algebraic Attacks on Grain-Like Keystream Generators. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Robi Pedersen, Osmanbey Uzunkol Delegating Supersingular Isogenies over $\mathbb {F}_{p^2}$ with Cryptographic Applications. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Deukjo Hong (eds.) Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Peixin Ren, Xiaozhuo Gu Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo Grover on SM3. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jonghyun Park, Hangi Kim, Jongsung Kim Improved See-In-The-Middle Attacks on AES. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik Improved Lattice-Based Mix-Nets for Electronic Voting. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou Designated-Verifier Linkable Ring Signatures. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Snehil Joshi, Durgesh Pandey, Kannan Srinathan ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gwangbae Choi, Serge Vaudenay Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1YoungBeom Kim, Hojin Choi, Seog Chung Seo Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor Nodes. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo (eds.) Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jan Vacek, Jan Václavek Key Mismatch Attack on ThreeBears, Frodo and Round5. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Huang Lin A Sub-linear Lattice-Based Submatrix Commitment Scheme. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Huanyu Wang, Elena Dubrova Federated Learning in Side-Channel Analysis. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bolin Wang, Chan Song, Wenling Wu, Lei Zhang 0186 A New Non-random Property of 4.5-Round PRINCE. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Jean-Jacques Quisquater Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Reza Azarderakhsh Curve448 on 32-Bit ARM Cortex-M4. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hyunji Kim, Yongbeen Kwon, Minjoo Sim, Sejin Lim, Hwajeong Seo Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md. Iftekhar Salam, Kim Young Law, Luxin Xue, Wei-Chuen Yau Differential Fault Based Key Recovery Attacks on TRIAD. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aline Gouget, Jacques Patarin, Ambre Toulemonde (Quantum) Cryptanalysis of Misty Schemes. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka Security Definitions on Time-Lock Puzzles. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hyunsu Mun, Soohyun Kim, Youngseok Lee 0002 A RDBMS-Based Bitcoin Analysis Method. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jayashree Dey, Ratna Dutta Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001 All the HIGHT You Need on Cortex-M4. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim 0001, Julian Jang-Jaccard, Masood Niazi Torshiz An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee Efficient Identity-Based Encryption from LWR. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti Improvement of Binary and Non Binary Statistical Decoding Algorithm. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek Systematic Construction of Nonlinear Product Attacks on Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Georgia Tsaloli, Aikaterini Mitrokotsa Sum It Up: Verifiable Additive Homomorphic Secret Sharing. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Taechan Kim 0001 Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim Faster Bootstrapping of FHE over the Integers. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida Authenticated Encryption Based on Lesamnta-LW Hashing Mode. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kyungho Kim, Seungju Choi, Hyeokdong Kwon, Zhe Liu 0001, Hwajeong Seo FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dongyoung Roh, Bonwook Koo, Younghoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim Revised Version of Block Cipher CHAM. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kwangsu Lee (eds.) Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson Differential Random Fault Attacks on Certain CAESAR Stream Ciphers. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hayato Fujii, Félix Carvalho Rodrigues, Julio César López-Hernández Fast AES Implementation Using ARMv8 ASIMD Without Cryptography Extension. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jae Heon Kim, Je Hong Park, Dong-Chan Kim, Woo-Hwan Kim Complete Addition Law for Montgomery Curves. Search on Bibsonomy ICISC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson 0001 Recurrent Neural Networks for Fuzz Testing Web Browsers. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kento Oonishi, Noboru Kunihiro Attacking Noisy Secret CRT-RSA Exponents in Binary Method. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroki Okada 0001, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi On the Complexity of the LWR-Solving BKW Algorithm. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroki Sudo, Koji Nuida, Kana Shimizu An Efficient Private Evaluation of a Decision Graph. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Duhyeong Kim, Yongsoo Song Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Romar B. dela Cruz, Say Ol Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Howon Kim 0001, Dong-Chan Kim (eds.) Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matthias Geihs, Johannes Buchmann 0001 \mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meiqi He, Gongxian Zeng, Jun Zhang 0049, Linru Zhang, Yuechen Chen, Siu-Ming Yiu A New Privacy-Preserving Searching Model on Blockchain. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuecheng Ma, Dongdai Lin Multi-identity IBFHE and Multi-attribute ABFHE in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Koji Shima, Hiroshi Doi A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chao Liu 0060, Zhongxiang Zheng, Guangnan Zou Key Reuse Attack on NewHope Key Exchange Protocol. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sisi Yuan, Yuewu Wang, Pingjian Wang, Lingguang Lei, Quan Zhou, Jun Li How to Block the Malicious Access to Android External Storage. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier Practical Algebraic Side-Channel Attacks Against ACORN. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 678 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license