default search action
18. ICISC 2015: Seoul, Korea
- Soonhak Kwon, Aaram Yun:
Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9558, Springer 2016, ISBN 978-3-319-30839-5
Digital Signatures
- David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. 3-19 - Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. 20-35 - Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Attribute-Based Two-Tier Signatures: Definition and Construction. 36-49
Public-Key Cryptography
- Benjamin Wesolowski, Pascal Junod:
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. 53-68 - Özgür Dagdelen, Sebastian Gajek, Florian Göpfert:
Learning with Errors in the Exponent. 69-84
Block Cipher Cryptanalysis
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. 87-101 - Huiling Zhang, Wenling Wu, Yanfeng Wang:
Integral Attack Against Bit-Oriented Block Ciphers. 102-118 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. 119-135 - Ning Wang, Xiaoyun Wang, Keting Jia:
Improved Impossible Differential Attack on Reduced-Round LBlock. 136-152
Elliptic Curve Cryptography
- Koray Karabina:
Point Decomposition Problem in Binary Elliptic Curves. 155-168 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). 169-181
Protocols
- Maki Yoshida, Satoshi Obana:
On the (In)Efficiency of Non-Interactive Secure Multiparty Computation. 185-193 - Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang:
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. 194-209 - Seth Gilbert, Xiao Liu, Haifeng Yu:
On Differentially Private Online Collaborative Recommendation Systems. 210-226
Security
- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. 229-245 - Maksim O. Shudrak, Vyacheslav V. Zolotarev:
Improving Fuzzing Using Software Complexity Metrics. 246-261 - Julian Vetter, Matthias Junker-Petschick, Jan Nordholz, Michael Peter, Janis Danisevskis:
Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector. 262-277 - Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. 278-293
Side-Channel Attacks
- Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. 297-313 - Tomoyuki Tanigaki, Noboru Kunihiro:
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. 314-328 - HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. 329-342
Physical Unclonable Functions
- Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. 345-358 - Lukasz Krzywiecki:
Anonymous Authentication Scheme Based on PUF. 359-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.