default search action
12. ICISC 2009: Seoul, Korea
- Dong Hoon Lee, Seokhie Hong:
Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5984, Springer 2010, ISBN 978-3-642-14422-6
Key Management and Key Exchange
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. 1-15 - Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu:
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. 16-33 - Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. 34-46
Public Key Cryptography
- Yumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa:
Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing. 47-64 - Eric Brier, David Naccache, Mehdi Tibouchi:
Factoring Unbalanced Moduli with Known Bits. 65-72
Algebraic Cryptanalysis and Stream Cipher
- Jeremy Erickson, Jintai Ding, Chris Christensen:
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. 73-86 - Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann, Stanislav Bulygin:
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. 87-100 - Joo Yeon Cho, Miia Hermelin:
Improved Linear Cryptanalysis of SOSEMANUK. 101-117
Security Management and E?cient Implementation
- Aivo Jürgenson, Jan Willemson:
Serial Model for Attack Tree Computations. 118-128 - Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar:
Lightweight Cryptography and RFID: Tackling the Hidden Overheads. 129-145
Side Channel Attack
- Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Christof Paar:
Power Analysis of Single-Rail Storage Elements as Used in MDPL. 146-160 - Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger:
A Timing Attack against Patterson Algorithm in the McEliece PKC. 161-175 - Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. 176-192
Privacy Enhanced Technology
- Helger Lipmaa:
First CPIR Protocol with Data-Dependent Computation. 193-210 - Qingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Efficient Fuzzy Matching and Intersection on Private Datasets. 211-228 - Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg:
Efficient Privacy-Preserving Face Recognition. 229-244
Cryptographic Protocol
- Tord Ingolf Reistad, Tomas Toft:
Linear, Constant-Rounds Bit-Decomposition. 245-257 - Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol. 258-273 - Alessandro Sorniotti, Refik Molva:
Secret Handshakes with Revocation Support. 274-299
Cryptanalysis of Hash Function
- Shuang Wu, Dengguo Feng, Wenling Wu:
Practical Rebound Attack on 12-Round Cheetah-256. 300-314 - Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon:
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. 315-331 - Deukjo Hong, Bonwook Koo, Yu Sasaki:
Improved Preimage Attack for 68-Step HAS-160. 332-348 - Siyuan Qiao, Wei Wang, Keting Jia:
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. 349-361
Network Security
- Madeline González Muñiz, Rainer Steinwandt:
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. 362-373 - Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young Ik Eom:
Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. 374-385
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.