


default search action
17. ICISC 2014: Seoul, Korea
- Jooyoung Lee, Jongsung Kim:
Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8949, Springer 2015, ISBN 978-3-319-15942-3
RSA Security
- Atsushi Takayasu, Noboru Kunihiro
:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. 3-17 - Ivan Damgård, Gert Læssøe Mikkelsen, Tue Skeltved
:
On the Security of Distributed Multiprime RSA. 18-33
Digital Signature
- Kazuki Yoneyama:
Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs. 37-52 - Wenbin Zhang, Chik How Tan:
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme. 53-66
Public Key Cryptography
- Yasuyuki Nogami, Hwajeong Seo:
Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1. 69-83 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks. 84-100 - Dan Ding, Guizhen Zhu, Yang Yu
, Zhongxiang Zheng:
A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors. 101-113
Block Ciphers
- Sho Sakikoyama, Yosuke Todo
, Kazumaro Aoki, Masakatu Morii:
How Much Can Complexity of Linear Cryptanalysis Be Reduced? 117-131 - Jung-Keun Lee, Bonwook Koo, Dongyoung Roh
, Woo-Hwan Kim, Daesung Kwon:
Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers. 132-159 - Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
:
Bicliques with Minimal Data and Time Complexity for AES. 160-174 - Junko Takahashi, Toshinori Fukunaga:
Fault Analysis on SIMON Family of Lightweight Block Ciphers. 175-189
Network Security
- Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu:
A Clustering Approach for Privacy-Preserving in Social Networks. 193-204 - Abdelrahaman Aly, Mathieu Van Vyve:
Securely Solving Classical Network Flow Problems. 205-221 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar:
Remote IP Protection Using Timing Channels. 222-237
Mobile Security
- Su Mon Kywe, Yingjiu Li, Robert H. Deng
, Jason I. Hong
:
Detecting Camouflaged Applications on Mobile Application Markets. 241-254 - Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing:
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. 255-268
Hash Functions
- Jiageng Chen
, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. 271-285 - Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon:
LSH: A New Fast Secure Hash Function Family. 286-313
Information Hiding and Efficiency
- Cheonshik Kim
, Jinsuk Baek, Paul S. Fisher:
Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern. 317-327 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:
Montgomery Modular Multiplication on ARM-NEON Revisited. 328-342 - Sumit Kumar Debnath, Ratna Dutta:
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function. 343-359
Cryptographic Protocol
- Christian L. F. Corniaux, Hossein Ghodosi:
Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols. 363-380 - Ioana Boureanu, Serge Vaudenay:
Compact and Efficient UC Commitments Under Atomic-Exchanges. 381-401 - Vandana Guleria, Ratna Dutta:
Issuer-Free Adaptive Oblivious Transfer with Access Policy. 402-418
Side-Channel Attacks
- Chien-Ning Chen:
Memory Address Side-Channel Analysis on Exponentiation. 421-432 - Mohamed Saied Emam Mohamed, Johannes Buchmann:
Mutant Differential Fault Analysis of Trivium MDFA. 433-446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.