


default search action
14. ICISC 2011: Seoul, Korea
- Howon Kim:
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7259, Springer 2012, ISBN 978-3-642-31911-2
Hash Function I
- Yu Sasaki, Kazumaro Aoki:
Improved Integral Analysis on Tweaked Lesamnta. 1-17 - Thorsten Ernst Schilling, Håvard Raddum
:
Analysis of Trivium Using Compressed Right Hand Side Equations. 18-32 - Florian Mendel
, Tomislav Nad, Martin Schläffer:
Cryptanalysis of Round-Reduced HAS-160. 33-47
Side Channel Analysis I
- Daehyun Strobel, Christof Paar:
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. 48-60 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. 61-73 - Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon:
Correcting Errors in Private Keys Obtained from Cold Boot Attacks. 74-87
Public Key Cryptography
- Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:
Strong Security Notions for Timed-Release Public-Key Encryption Revisited. 88-108 - Song Luo, Qingni Shen, Zhong Chen:
Fully Secure Unidirectional Identity-Based Proxy Re-encryption. 109-126
Network and Mobile Security
- Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng:
Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition. 127-139 - Kai Chen, Yifeng Lian, Yingjun Zhang:
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. 140-154
Digital Signature
- Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert:
Weaknesses in Current RSA Signature Schemes. 155-168 - Shuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen:
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations. 169-185
Side Channel Analysis II
- Keita Emura
, Atsuko Miyaji
, Kazumasa Omote:
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. 186-203 - Laila El Aimani:
Generic Constructions for Verifiable Signcryption. 204-218 - Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du:
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. 219-234
Cryptanalysis
- Kyung Chul Jeong
, Dong Hoon Lee, Daewan Han:
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. 235-247 - Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. 248-260 - Yusong Du, Fangguo Zhang
, Meicheng Liu:
On the Resistance of Boolean Functions against Fast Algebraic Attacks. 261-274 - Yu Chen, Liqun Chen
, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. 275-301
Efficient Implementation
- Marko Wolf
, Timo Gendrullis:
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. 302-318 - Jothi Rangasamy
, Douglas Stebila
, Lakshmi Kuppusamy
, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. 319-331 - Paolo Palmieri
, Olivier Pereira:
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. 332-345
Hash Function II
- Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. 346-364 - Deukjo Hong, Bonwook Koo, Daesung Kwon:
Biclique Attack on the Full HIGHT. 365-374 - Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:
Preimage Attacks on Step-Reduced SM3 Hash Function. 375-390
Cryptographic Application
- Vu Duc Nguyen, Yang-Wai Chow
, Willy Susilo
:
Breaking a 3D-Based CAPTCHA Scheme. 391-405 - Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. 406-418 - Zhenfei Zhang, Thomas Plantard
, Willy Susilo
:
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. 419-436 - Teruya Minamoto
, Ryuji Ohura:
A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic. 437-449
Cryptographic Protocol
- Ashish Choudhury
, Arpita Patra:
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. 450-466 - Kazuki Yoneyama:
Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles. 467-489 - Atsushi Fujioka, Koutarou Suzuki:
Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys. 490-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.