


default search action
26th ICISC 2023, Seoul, South Korea - Part I
- Hwajeong Seo
, Suhri Kim
:
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14561, Springer 2024, ISBN 978-981-97-1234-2
Cryptanalysis and Quantum Cryptanalysis
- Seungjun Baek
, Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Enhancing the Related-Key Security of PIPO Through New Key Schedules. 3-18 - Jinpeng Liu, Ling Sun:
Distinguisher and Related-Key Attack on HALFLOOP-96. 19-40 - Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang:
Revisiting Key Switching Techniques with Applications to Light-Key FHE. 41-64 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Optimized Quantum Implementation of SEED. 65-78 - Yujin Yang
, Kyungbae Jang
, Yujin Oh
, Hwajeong Seo
:
Depth-Optimized Quantum Implementation of ARIA. 79-96 - Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwang-il Bae, Il Kwon Sohn, Hwajeong Seo:
Finding Shortest Vector Using Quantum NV Sieve on Grover. 97-118 - Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator. 119-139 - Rini Wisnu Wardhani
, Dedy Septono Catur Putranto
, Howon Kim
:
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis. 140-160
Side Channel Attack
- Shunsuke Osaki
, Noboru Kunihiro
:
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. 163-184 - Keon-Hee Choi
, Ju-Hwan Kim
, Jaeseung Han
, Jae-Won Huh
, Dong-Guk Han
:
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure. 185-201 - Yen-Ting Kuo
, Atsushi Takayasu
:
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis. 202-220 - Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen, Haotong Xu:
Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber. 221-239 - Yan Yan, Elisabeth Oswald, Arnab Roy:
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test. 240-258
Signature Schemes
- Masayuki Tezuka
, Keisuke Tanaka:
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost. 261-281 - Surbhi Shaw
, Ratna Dutta:
Compact Identity-Based Signature and Puncturable Signature from SQISign. 282-305 - Chik How Tan
, Theo Fanuela Prabowo
:
High Weight Code-Based Signature Scheme from QC-LDPC Codes. 306-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.