default search action
19. ICISC 2016: Seoul, Korea
- Seokhie Hong, Jong Hwan Park:
Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10157, 2017, ISBN 978-3-319-53176-2
Protocols
- Rosario Giustolisi, Christian Gehrmann, Markus Ahlström, Simon Holmberg:
A Secure Group-Based AKA Protocol for Machine-Type Communications. 3-27 - Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. 28-48
Lattice Cryptography
- Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE. 51-74 - Jeongsu Kim, Suyong Park, Seonggeun Kim, Busik Jang, Sang Geun Hahn, Sangim Jung, Dongyoung Roh:
Analysis of Error Terms of Signatures Based on Learning with Errors. 75-97
Encryption
- Kwangsu Lee:
Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. 101-125 - Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue:
Lossy Key Encapsulation Mechanism and Its Applications. 126-144 - Minqian Wang, Zhenfeng Zhang:
Expanded Framework for Dual System Encryption and Its Application. 145-160 - Kamalesh Acharya, Ratna Dutta:
Adaptively Secure Broadcast Encryption with Dealership. 161-177
Implementation and Algorithms
- Shoukat Ali, Murat Cenk:
A New Algorithm for Residue Multiplication Modulo 2^521-1. 181-193 - Paulo Martins, Leonel Sousa:
Enhancing Data Parallelism of Fully Homomorphic Encryption. 194-207 - Md. Al-Amin Khandaker, Hirotaka Ono, Yasuyuki Nogami, Masaaki Shirase, Sylvain Duquesne:
An Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse Multiplication. 208-219
Signatures (and Protocol)
- Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. 223-238 - Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. 239-253 - Sumit Kumar Debnath, Ratna Dutta:
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness. 254-284
Analysis
- Liqiang Peng, Lei Hu, Yao Lu:
Improved Results on Cryptanalysis of Prime Power RSA. 287-303 - Yusong Du, Baodian Wei:
On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks. 304-316 - Jingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng:
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. 317-332 - Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin, Debin Gao:
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation. 333-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.